Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE

From MaRDI portal
Publication:3582750


DOI10.1007/978-3-642-14623-7_6zbMath1280.94035MaRDI QIDQ3582750

Xavier Boyen, Shweta Agrawal, Dan Boneh

Publication date: 24 August 2010

Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_6


94A60: Cryptography


Related Items

Unnamed Item, Identity-based blind signature from lattices, Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications, Algorithms for the Generalized NTRU Equations and their Storage Analysis, Collusion Resistant Traitor Tracing from Learning with Errors, Algebraic Attacks Against Several Weak Variants of GVW’13 ABE, Succinct vector, polynomial, and functional commitments from lattices, Efficient laconic cryptography from learning with errors, A new framework for more efficient round-optimal lattice-based (partially) blind signature via trapdoor sampling, More efficient adaptively secure lattice-based IBE with equality test in the standard model, Multi-authority ABE from lattices without random oracles, Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance, A framework for practical anonymous credentials from lattices, Candidate witness encryption from lattice techniques, Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding, Forward-secure revocable secret handshakes from lattices, Lattice-based programmable hash functions and applications, A lattice-based forward secure IBE scheme for Internet of things, Hardness of (M)LWE with semi-uniform seeds, An efficient IBE scheme with tight security reduction in the random oracle model, Strongly secure authenticated key exchange from factoring, codes, and lattices, Lattice-based key exchange on small integer solution problem, Lattice-based certificateless encryption scheme, Faster Gaussian sampling for trapdoor lattices with arbitrary modulus, Hardness of \(k\)-LWE and applications in traitor tracing, A lattice-based identity-based proxy blind signature scheme in the standard model, Relations between semantic security and anonymity in identity-based encryption, Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption, Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity, Optimal broadcast encryption from pairings and LWE, Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}, Exact lattice sampling from non-Gaussian distributions, Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance, Wildcarded identity-based encryption from lattices, LWE from non-commutative group rings, Implementation of lattice trapdoors on modules and applications, Key-homomorphic pseudorandom functions from LWE with small modulus, Identity-based key-exposure resilient cloud storage public auditing scheme from lattices, Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage, Efficient identity-based encryption with hierarchical key-insulation from HIBE, Efficient public-key encryption with equality test from lattices, Anonymous HIBE with short ciphertexts: full security in prime order groups, A new Gaussian sampling for trapdoor lattices with arbitrary modulus, Extended dual system group and shorter unbounded hierarchical identity based encryption, Public key encryption with equality test in the standard model, A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes, Scalable revocable identity-based signature over lattices in the standard model, Efficient and fully secure lattice-based IBE with equality test, Forward-secure revocable identity-based encryption, Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes, Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security, Augmented Learning with Errors: The Untapped Potential of the Error Term, The Geometry of Lattice Cryptography, Anonymous Encryption with Partial-Order Subset Delegation Functionality, Targeted Homomorphic Attribute-Based Encryption, Compact Hierarchical IBE from Lattices in the Standard Model, Simplified Revocable Hierarchical Identity-Based Encryption from Lattices, Trapdoors for Ideal Lattices with Applications