Key-oblivious encryption from isogenies with application to accountable tracing signatures
From MaRDI portal
Publication:6157596
DOI10.1007/978-3-030-92518-5_17zbMATH Open1514.94130OpenAlexW4206073839MaRDI QIDQ6157596FDOQ6157596
Authors: Surbhi Shaw, Ratna Dutta
Publication date: 12 May 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-92518-5_17
Recommendations
Cites Work
- Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model
- The Arithmetic of Elliptic Curves
- Title not available (Why is that?)
- Title not available (Why is that?)
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Abelian varieties over finite fields
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Title not available (Why is that?)
- Title not available (Why is that?)
- Noninteractive Zero-Knowledge
- CSIDH: an efficient post-quantum commutative group action
- He gives C-sieves on the CSIDH
- Quantum security analysis of CSIDH
- CSI-FiSh: efficient isogeny based signatures through class group computations
- SeaSign: compact isogeny signatures from class group actions
- Breaking the decisional Diffie-Hellman problem for class group actions using genus theory
- SiGamal: a supersingular isogeny-based PKE and its application to a PRF
- Accountable tracing signatures from lattices
Cited In (2)
This page was built for publication: Key-oblivious encryption from isogenies with application to accountable tracing signatures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6157596)