Adaptive multiparty NIKE
From MaRDI portal
Publication:6114272
DOI10.1007/978-3-031-22365-5_9zbMath1519.94148OpenAlexW4312996551MaRDI QIDQ6114272
Mark Zhandry, Venkata Koppula, Brent Waters
Publication date: 14 August 2023
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-22365-5_9
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Distributed systems (68M14)
Related Items (2)
Multiparty noninteractive key exchange from ring key-homomorphic weak PRFs ⋮ Adaptive multiparty NIKE
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks
- Private constrained PRFs (and more) from LWE
- On tightly secure non-interactive key exchange
- Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups
- Adaptively secure constrained pseudorandom functions in the standard model
- Incompressible cryptography
- Multiparty non-interactive key exchange and more from isogenies on elliptic curves
- Adaptively secure constrained pseudorandom functions
- Towards tight adaptive security of non-interactive key exchange
- Reducing Depth in Constrained PRFs: From Bit-Fixing to $$\mathbf {NC}^{1}$$
- Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation
- Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model
- Constrained Pseudorandom Functions and Their Applications
- Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
- Functional Encryption with Bounded Collusions via Multi-party Computation
- Adaptive Security of Constrained PRFs
- How to Generate and Use Universal Samplers
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Indistinguishability Obfuscation from Compact Functional Encryption
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- New directions in cryptography
- Indistinguishability Obfuscation from Functional Encryption
- Non-Interactive Key Exchange
- Candidate Multilinear Maps from Ideal Lattices
- How to use indistinguishability obfuscation
- Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions
- Key-Homomorphic Constrained Pseudorandom Functions
- Breaking the Sub-Exponential Barrier in Obfustopia
- Functional Signatures and Pseudorandom Functions
- Why Proving HIBE Systems Secure Is Difficult
- Déjà Q: Using Dual Systems to Revisit q-Type Assumptions
- The Twin Diffie-Hellman Problem and Applications
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE
- Constrained Pseudorandom Functions for Unconstrained Inputs
- On the Impossibility of Tight Cryptographic Reductions
- Adaptive multiparty NIKE
This page was built for publication: Adaptive multiparty NIKE