scientific article; zbMATH DE number 1405637

From MaRDI portal
Publication:4938616

zbMath0987.94021MaRDI QIDQ4938616

Miklós Ajtai

Publication date: 23 June 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard ModelAttribute-Based Keyword Search from LatticesUntraceability of Partial Blind and Blind Signature SchemesLattice-based linearly homomorphic signatures in the standard modelTwo-message statistically sender-private OT from LWEPolicy-based signature scheme from latticesAttribute-based access control for inner product functional encryption from LWELattice-based HRA-secure attribute-based proxy re-encryption in standard modelOn the higher-bit version of approximate inhomogeneous short integer solution problemLattice-based IBE with equality test supporting flexible authorization in the standard modelShortest vector from lattice sieving: a few dimensions for freeFaster Gaussian sampling for trapdoor lattices with arbitrary modulusPost-quantum cryptography: lattice signaturesPuncturable identity-based and attribute-based encryption from latticesLattice-based public-key encryption with equality test supporting flexible authorization in standard modelScalable revocable identity-based signature over lattices in the standard modelLattice-based secret handshakes with reusable credentialsCryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013Hardness of \(k\)-LWE and applications in traitor tracingZero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group EncryptionMulti-key Homomorphic AuthenticatorsRevocable identity-based fully homomorphic signature scheme with signing key exposure resistanceGeneric constructions of master-key KDM secure attribute-based encryptionPublic key authenticated encryption with keyword search from LWELattice-based programmable hash functions and applicationsA lattice-based forward secure IBE scheme for Internet of thingsSimulatable verifiable random function from the LWE assumptionZero-knowledge arguments for matrix-vector relations and lattice-based group encryptionRevocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and moreCollusion Resistant Traitor Tracing from Learning with ErrorsLattice-based completely non-malleable public-key encryption in the standard modelSpeeding-up verification of digital signaturesSecure multi-source network coding scheme with lattice signatureTwo Efficient Tag-Based Encryption Schemes on LatticesCompact (Targeted Homomorphic) Inner Product Encryption from LWESimplified Revocable Hierarchical Identity-Based Encryption from LatticesExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationA lattice-based group signature scheme with verifier-local revocationImproved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and ApplicationsImproved (Hierarchical) Inner-Product Encryption from LatticesGenerating shorter bases for hard random latticesShort Stickelberger Class Relations and Application to Ideal-SVPConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWEWatermarking cryptographic functionalities from standard lattice assumptionsMulti-theorem preprocessing NIZKs from latticesLattice-based unidirectional infinite-use proxy re-signatures with private re-signature keyA lattice-based signcryption scheme without random oraclesAdaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymityAdaptively secure MPC with sublinear communication complexityDecentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}Multiparty reusable non-interactive secure computation from LWEChosen ciphertext attacks secure inner-product functional encryption from learning with errors assumptionThe Geometry of Lattice CryptographyProgrammable Hash Functions from Lattices: Short Signatures and IBEs with Small Key SizesWildcarded identity-based encryption from latticesChosen-ciphertext lattice-based public key encryption with equality test in standard modelAn optimized GHV-type HE scheme: simpler, faster, and more versatileLattice-based revocable (hierarchical) IBE with decryption key exposure resistanceCryptanalyses of Candidate Branching Program ObfuscatorsGenerating cryptographically-strong random lattice bases and recognizing rotations of \(\mathbb{Z}^n\)