Lattice-based programmable hash functions and applications
From MaRDI portal
Publication:6182001
DOI10.1007/s00145-023-09488-wOpenAlexW4389121399MaRDI QIDQ6182001
No author found.
Publication date: 23 January 2024
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-023-09488-w
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Programmable hash functions and their applications
- Families of finite sets in which no set is covered by the union of \(r\) others
- Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques
- Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance
- Short lattice signatures in the standard model with efficient tag generation
- Ring-based identity based encryption -- asymptotically shorter MPK and tighter security
- Cryptanalysis of GGH Map
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
- Lattice Signatures and Bimodal Gaussians
- Practical Multilinear Maps over the Integers
- Programmable Hash Functions in the Multilinear Setting
- Improved Short Lattice Signatures in the Standard Model
- Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More
- Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
- Lattice Signatures without Trapdoors
- Secure Identity-Based Encryption in the Quantum Random Oracle Model
- On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups
- Efficient Identity-Based Encryption over NTRU Lattices
- Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions
- Simpler Efficient Group Signatures from Lattices
- Leveled Fully Homomorphic Signatures from Standard Lattices
- Cryptanalysis of the Multilinear Map over the Integers
- Towards Tightly Secure Lattice Short Signature and Id-Based Encryption
- Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps
- Identity-Based Cryptosystems and Signature Schemes
- Short Signatures from Weaker Assumptions
- On the Amortized Complexity of Zero-Knowledge Protocols
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys
- Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
- Trapdoors for hard lattices and new cryptographic constructions
- Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More
- On Ideal Lattices and Learning with Errors over Rings
- Bonsai Trees, or How to Delegate a Lattice Basis
- Efficient Lattice (H)IBE in the Standard Model
- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
- Practical Identity-Based Encryption Without Random Oracles
- Programmable Hash Functions and Their Applications
- Digital Signatures
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
- Breaking RSA may not be equivalent to factoring
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Candidate Multilinear Maps from Ideal Lattices
- Practical Signatures from Standard Assumptions
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- An Improved Compression Technique for Signatures Based on Learning with Errors
- Asymptotically Efficient Lattice-Based Digital Signatures
- Worst‐Case to Average‐Case Reductions Based on Gaussian Measures
- Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters
- Theory of Cryptography
- On lattices, learning with errors, random linear codes, and cryptography
This page was built for publication: Lattice-based programmable hash functions and applications