I want to ride my \texttt{BICYCL} : \texttt{BICYCL} implements cryptography in class groups
From MaRDI portal
Publication:6110377
DOI10.1007/s00145-023-09459-1zbMath1517.94070OpenAlexW4367041092MaRDI QIDQ6110377
Laurent Imbert, Cyril Bouvier, Fabien Laguillaumie, Guilhem Castagnos
Publication date: 5 July 2023
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-023-09459-1
multi-party computationlinearly homomorphic encryptionclass group cryptographyimplementation libraryquadratic form arithmetic
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Improvements in the computation of ideal class groups of imaginary quadratic number fields
- Binary quadratic forms. An algorithmic approach
- A key-exchange system based on imaginary quadratic fields
- Computing discrete logarithms in quadratic orders
- Efficient designated-verifier non-interactive zero-knowledge proofs of knowledge
- Encryption switching protocols revisited: switching modulo \(p\)
- Practical fully secure unrestricted inner product functional encryption modulo \(p\)
- Transparent SNARKs from DARK compilers
- Bandwidth-efficient threshold EC-DSA
- Efficient range proofs with transparent setup from bounded integer commitments
- Compact zero-knowledge proofs for threshold ECDSA with trustless setup
- Subvector commitments with application to succinct arguments
- Batching techniques for accumulators with applications to IOPs and stateless blockchains
- CSI-FiSh: efficient isogeny based signatures through class group computations
- Two-party ECDSA from hash proof systems and efficient instantiations
- Improved efficiency of a linearly homomorphic cryptosystem
- Linearly Homomorphic Encryption from $$\mathsf {DDH}$$
- Quadratic sieving
- A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
- A Rigorous Subexponential Algorithm For Computation of Class Groups
- On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis
- Factoring pq 2 with Quadratic Forms: Nice Cryptanalyses
- New directions in cryptography
- Worst-case complexity bounds for algorithms in the theory of integral quadratic forms
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Advances in Cryptology - CRYPTO 2003
- Efficient verifiable delay functions
- Promise $$\varSigma $$-Protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups
- Threshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\)
- An algebraic framework for silent preprocessing with trustless setup and active security
- Vector commitments over rings and compressed \(\varSigma \)-protocols
This page was built for publication: I want to ride my \texttt{BICYCL} : \texttt{BICYCL} implements cryptography in class groups