Programmable Hash Functions and Their Applications

From MaRDI portal
Publication:3600211

DOI10.1007/978-3-540-85174-5_2zbMath1183.94052OpenAlexW2622017675WikidataQ59163745 ScholiaQ59163745MaRDI QIDQ3600211

Eike Kiltz, Dennis Hofheinz

Publication date: 10 February 2009

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-85174-5_2




Related Items (31)

Generic construction for tightly-secure signatures from discrete logShort Attribute-Based Signatures for Threshold PredicatesTwo-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and MoreThe Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iOSO-CCA secure PKE from pairing based all-but-many lossy trapdoor functionsProgrammable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public KeysAmbiguous One-Move Nominative Signature Without Random OraclesHomomorphic signatures with sublinear public keys via asymmetric programmable hash functionsLinearly homomorphic structure-preserving signatures and their applicationsThe power of undirected rewindings for adaptive securityAdaptive-Secure VRFs with Shorter Keys from Static AssumptionsA New Design of Online/Offline Signatures Based on LatticeLattice-based programmable hash functions and applicationsEfficient traceable signatures in the standard modelHow (not) to design strong-RSA signaturesOn the impossibility of purely algebraic signaturesLattice-based completely non-malleable public-key encryption in the standard modelNon-adaptive programmability of random oraclePredictable Arguments of KnowledgeConfined guessing: new signatures from standard assumptionsVerifiable Random Functions from Standard AssumptionsFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelTight security for signature schemes without random oraclesAdaptively secure distributed PRFs from \(\mathsf{LWE}\)Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive OpeningSimulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE SchemeNew RSA-Based (Selectively) Convertible Undeniable Signature SchemesEfficient adaptively-secure IB-KEMs and VRFs via near-collision resistanceProgrammable Hash Functions from Lattices: Short Signatures and IBEs with Small Key SizesConcise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short ProofsAn Efficient On-Line/Off-Line Signature Scheme without Random Oracles



Cites Work


This page was built for publication: Programmable Hash Functions and Their Applications