Puncturable Identity-Based Encryption from Lattices
From MaRDI portal
Publication:6488397
DOI10.1007/978-3-030-90567-5_29zbMATH Open1521.94041MaRDI QIDQ6488397FDOQ6488397
Authors: Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Partha Sarathi Roy
Publication date: 13 April 2023
Recommendations
- Revocable Identity-Based Encryption from Lattices
- Wildcarded identity-based encryption from lattices
- Deterministic public key encryption and identity-based encryption from lattices in the auxiliary-input setting
- Deterministic identity-based encryption from lattices with more compact public parameters
- A practical implementation of identity-based encryption over NTRU lattices
- Efficient identity-based encryption over NTRU lattices
- Almost tight multi-instance multi-ciphertext identity-based encryption on lattices
- Lattice-based identity-based resplittable threshold public key encryption scheme
- Efficient identity-based encryption from LWR
Cites Work
- Public-key cryptosystems from the worst-case shortest vector problem
- On lattices, learning with errors, random linear codes, and cryptography
- Trapdoors for hard lattices and new cryptographic constructions
- Bonsai trees, or how to delegate a lattice basis
- Efficient lattice (H)IBE in the standard model
- Efficient Identity-Based Encryption Without Random Oracles
- Classical hardness of learning with errors
- Generating shorter bases for hard random lattices
- Theory of Cryptography
- Trapdoors for lattices: simpler, tighter, faster, smaller
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
- Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits
- Watermarking cryptographic capabilities
- Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security
- Revisiting proxy re-encryption: forward secrecy, improved security, and applications
- 0-RTT key exchange with full forward secrecy
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
- Public-key puncturable encryption: modular and compact constructions
- Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
Cited In (9)
- Revocable Identity-Based Encryption from Lattices
- Zero-knowledge range arguments for signed fractional numbers from lattices
- Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
- Public-key puncturable encryption: modular and compact constructions
- Puncturable identity-based and attribute-based encryption from lattices
- Puncturable signature: a generic construction and instantiations
- A lightweight identification protocol based on lattices
- Spatial encryption revisited: from delegatable multiple inner product encryption and more
- Incremental symmetric puncturable encryption with support for unbounded number of punctures
This page was built for publication: Puncturable Identity-Based Encryption from Lattices
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6488397)