Key-oblivious encryption from isogenies with application to accountable tracing signatures
From MaRDI portal
Publication:6157596
Recommendations
Cites work
- scientific article; zbMATH DE number 1722673 (Why is no real title available?)
- scientific article; zbMATH DE number 2081087 (Why is no real title available?)
- scientific article; zbMATH DE number 1440072 (Why is no real title available?)
- scientific article; zbMATH DE number 3356934 (Why is no real title available?)
- Abelian varieties over finite fields
- Accountable tracing signatures from lattices
- Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model
- Breaking the decisional Diffie-Hellman problem for class group actions using genus theory
- CSI-FiSh: efficient isogeny based signatures through class group computations
- CSIDH: an efficient post-quantum commutative group action
- He gives C-sieves on the CSIDH
- Noninteractive Zero-Knowledge
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Quantum security analysis of CSIDH
- SeaSign: compact isogeny signatures from class group actions
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- SiGamal: a supersingular isogeny-based PKE and its application to a PRF
- The Arithmetic of Elliptic Curves
Cited in
(2)
This page was built for publication: Key-oblivious encryption from isogenies with application to accountable tracing signatures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6157596)