scientific article; zbMATH DE number 1405637
From MaRDI portal
Publication:4938616
zbMath0987.94021MaRDI QIDQ4938616
Publication date: 23 June 2002
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard Model ⋮ Attribute-Based Keyword Search from Lattices ⋮ Untraceability of Partial Blind and Blind Signature Schemes ⋮ Lattice-based linearly homomorphic signatures in the standard model ⋮ Two-message statistically sender-private OT from LWE ⋮ Policy-based signature scheme from lattices ⋮ Attribute-based access control for inner product functional encryption from LWE ⋮ Lattice-based HRA-secure attribute-based proxy re-encryption in standard model ⋮ On the higher-bit version of approximate inhomogeneous short integer solution problem ⋮ Lattice-based IBE with equality test supporting flexible authorization in the standard model ⋮ Shortest vector from lattice sieving: a few dimensions for free ⋮ Faster Gaussian sampling for trapdoor lattices with arbitrary modulus ⋮ Post-quantum cryptography: lattice signatures ⋮ Puncturable identity-based and attribute-based encryption from lattices ⋮ Lattice-based public-key encryption with equality test supporting flexible authorization in standard model ⋮ Scalable revocable identity-based signature over lattices in the standard model ⋮ Lattice-based secret handshakes with reusable credentials ⋮ Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013 ⋮ Hardness of \(k\)-LWE and applications in traitor tracing ⋮ Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption ⋮ Multi-key Homomorphic Authenticators ⋮ Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance ⋮ Generic constructions of master-key KDM secure attribute-based encryption ⋮ Public key authenticated encryption with keyword search from LWE ⋮ Lattice-based programmable hash functions and applications ⋮ A lattice-based forward secure IBE scheme for Internet of things ⋮ Simulatable verifiable random function from the LWE assumption ⋮ Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption ⋮ Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more ⋮ Collusion Resistant Traitor Tracing from Learning with Errors ⋮ Lattice-based completely non-malleable public-key encryption in the standard model ⋮ Speeding-up verification of digital signatures ⋮ Secure multi-source network coding scheme with lattice signature ⋮ Two Efficient Tag-Based Encryption Schemes on Lattices ⋮ Compact (Targeted Homomorphic) Inner Product Encryption from LWE ⋮ Simplified Revocable Hierarchical Identity-Based Encryption from Lattices ⋮ Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification ⋮ A lattice-based group signature scheme with verifier-local revocation ⋮ Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications ⋮ Improved (Hierarchical) Inner-Product Encryption from Lattices ⋮ Generating shorter bases for hard random lattices ⋮ Short Stickelberger Class Relations and Application to Ideal-SVP ⋮ Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE ⋮ Watermarking cryptographic functionalities from standard lattice assumptions ⋮ Multi-theorem preprocessing NIZKs from lattices ⋮ Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key ⋮ A lattice-based signcryption scheme without random oracles ⋮ Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity ⋮ Adaptively secure MPC with sublinear communication complexity ⋮ Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}} ⋮ Multiparty reusable non-interactive secure computation from LWE ⋮ Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption ⋮ The Geometry of Lattice Cryptography ⋮ Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes ⋮ Wildcarded identity-based encryption from lattices ⋮ Chosen-ciphertext lattice-based public key encryption with equality test in standard model ⋮ An optimized GHV-type HE scheme: simpler, faster, and more versatile ⋮ Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance ⋮ Cryptanalyses of Candidate Branching Program Obfuscators ⋮ Generating cryptographically-strong random lattice bases and recognizing rotations of \(\mathbb{Z}^n\)