Novel identity-based hash proof system with compact master public key from lattices in the standard model
From MaRDI portal
Publication:5205013
DOI10.1142/S0129054119400148zbMATH Open1439.94038OpenAlexW2955071147MaRDI QIDQ5205013FDOQ5205013
Authors: Qiqi Lai, Bo Yang, Zhe Xia, Yuan Chen, Zhenlong Li, Yannan Li
Publication date: 10 December 2019
Published in: International Journal of Foundations of Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1142/s0129054119400148
Recommendations
- Anonymous identity-based hash proof system from lattices in the standard model
- Anonymous Identity-Based Hash Proof System and Its Applications
- Efficient lattice (H)IBE in the standard model
- Identity-based signatures from lattices: simpler, faster, shorter
- Identity-based extractable hash proofs and their applications
Cites Work
- Trapdoors for hard lattices and new cryptographic constructions
- Efficient lattice (H)IBE in the standard model
- Title not available (Why is that?)
- Generating shorter bases for hard random lattices
- On lattices, learning with errors, random linear codes, and cryptography
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Public-Key Cryptosystems Resilient to Key Leakage
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Public-key encryption in the bounded-retrieval model
- A New Randomness Extraction Paradigm for Hybrid Encryption
- A new general framework for secure public key encryption with keyword search
- Strongly leakage-resilient authenticated key exchange
- Anonymous identity-based hash proof system from lattices in the standard model
- Strong authenticated key exchange with auxiliary inputs
- Cryptographic reverse firewall via malleable smooth projective hash functions
- Anonymous Identity-Based Hash Proof System and Its Applications
- A note on the strong authenticated key exchange with auxiliary inputs
- One-round strong oblivious signature-based envelope
Cited In (5)
- A gapless code-based hash proof system based on RQC and its applications
- Tighter security proofs for GPV-IBE in the quantum random oracle model
- Anonymous identity-based hash proof system from lattices in the standard model
- Sound and complete computational interpretation of symbolic hashes in the standard model
- A gapless post-quantum hash proof system in the Hamming metric
This page was built for publication: Novel identity-based hash proof system with compact master public key from lattices in the standard model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5205013)