scientific article; zbMATH DE number 1996402
From MaRDI portal
Publication:4432349
zbMath1030.94032MaRDI QIDQ4432349
Publication date: 22 October 2003
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
elliptic curve cryptographymultilinear mapsabelian variety cryptographygeneralized Tate pairinggeneralized Weil pairing
Related Items
Tensors in computations, Impossibility of order-revealing encryption in idealized models, The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks, Return of GGH15: provable security against zeroizing attacks, Cryptanalysis of tripartite and multi-party authenticated key agreement protocols, Redei reciprocity, governing fields and negative Pell, Cryptanalysis of multilinear maps from ideal lattices: revisited, From FE combiners to secure MPC and back, Algebraic generalization of Diffie-Hellman key exchange, Multiparty noninteractive key exchange from ring key-homomorphic weak PRFs, Multilinear maps from obfuscation, Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation, Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications, Multiparty non-interactive key exchange and more from isogenies on elliptic curves, Identity-based encryption in DDH hard groups, Cryptanalysis of the CLT13 multilinear map, Adaptive multiparty NIKE, Homomorphic encryption: a mathematical survey, Cryptographic multilinear maps using pro-\(p\) groups, A survey on functional encryption, Group homomorphic encryption: characterizations, impossibility results, and applications, On the security of some aggregate signature schemes, Identity-based aggregate signcryption in the standard model from multilinear maps, Group key agreement for secure group communication in dynamic peer systems, Efficient selective identity-based encryption without random oracles, Offline witness encryption with semi-adaptive security, Practical Order-Revealing Encryption with Limited Leakage, Generic hardness of inversion on ring and its relation to self-bilinear map, An algebraic framework for Diffie-Hellman assumptions, Obfuscating conjunctions, Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation, Efficient obfuscation for CNF circuits and applications in cloud computing, Algebraic curves and cryptography, Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits, Constraining Pseudorandom Functions Privately, Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE, Multi-party authenticated key agreement protocols from multi-linear forms, Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings, Multilinear Maps from Obfuscation, How to build time-lock encryption, Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps, Attribute-based fuzzy identity access control in multicloud computing environments, Asymmetric Group Key Agreement, Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information, Shorter Circuit Obfuscation in Challenging Security Models, Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol, A group key agreement protocol from pairings, Homomorphic Encryption, Lattice-Based SNARGs and Their Application to More Efficient Obfuscation