Quantum-safe identity-based broadcast encryption with provable security from multivariate cryptography
DOI10.3934/AMC.2022026zbMATH Open1541.94061MaRDI QIDQ6556582FDOQ6556582
Authors: Ramprasad Sarkar, Mriganka Mandal, Sourav Mukhopadhyay
Publication date: 17 June 2024
Published in: Advances in Mathematics of Communications (Search for Journal in Brave)
Recommendations
- A multivariate identity-based broadcast encryption with applications to the Internet of Things
- Post-quantum secure inner product functional encryption using multivariate public key cryptography
- A new multivariate-based certificateless hybrid signcryption scheme for multi-recipient
- Extended multivariate public key cryptosystems with secure encryption function
- Ring signature scheme based on multivariate public key cryptosystems
identity-based encryptionbroadcast encryptionpost-quantum cryptographymultivariate public-key cryptographychosen-ciphertext attack security
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30) Quantum cryptography (quantum-theoretic aspects) (81P94) Network protocols (68M12)
Cites Work
- Title not available (Why is that?)
- Public key broadcast encryption for stateless receivers
- Title not available (Why is that?)
- Title not available (Why is that?)
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- SSE Implementation of Multivariate PKCs on Modern x86 CPUs
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Contributions to the Theory of Finite Fields
- Multivariate public key cryptosystems
- Optimal broadcast encryption from pairings and LWE
- Optimal broadcast encryption from LWE and pairings in the standard model
- Theory of Cryptography
- On a special class of polynomials.
This page was built for publication: Quantum-safe identity-based broadcast encryption with provable security from multivariate cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6556582)