Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
From MaRDI portal
Publication:6544463
Recommendations
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
- Anonymous and leakage resilient IBE and IPE
- Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio
- Leakage resilient IBE and IPE under the DLIN assumption
- Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters
Cites work
- scientific article; zbMATH DE number 1979273 (Why is no real title available?)
- scientific article; zbMATH DE number 2086698 (Why is no real title available?)
- Achieving leakage resilience through dual system encryption
- Advances in Cryptology - CRYPTO 2003
- Anonymous IBE, leakage resilience and circular security from new assumptions
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Classical hardness of learning with errors
- Dual System Encryption via Predicate Encodings
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Extended Nested Dual System Groups, Revisited
- Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits
- Fully secure attribute-based encryption for \(t\)-CNF from LWE
- Functional encryption for inner product predicates from learning with errors
- Functional encryption with bounded collusions via multi-party computation
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Fuzzy Identity-Based Encryption
- Generating shorter bases for hard random lattices
- Improved dual system ABE in prime-order groups via predicate encodings
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
- Leakage-resilient cryptography from minimal assumptions
- Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- On Forward-Secure Storage
- On lattices, learning with errors, random linear codes, and cryptography
- Pseudorandomness
- Public-Key Cryptosystems Resilient to Key Leakage
- Public-key cryptosystems from the worst-case shortest vector problem
- Public-key encryption in the bounded-retrieval model
- Public-key encryption schemes with auxiliary inputs
- Randomness is linear in space
- Riding on asymmetry: efficient ABE for branching programs
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Tamper and Leakage Resilience in the Split-State Model
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Trapdoors for lattices: simpler, tighter, faster, smaller
This page was built for publication: Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6544463)