Post-quantum public-key authenticated searchable encryption with forward security: general construction, and applications
From MaRDI portal
Publication:6573667
Recommendations
- Public key authenticated encryption with keyword search from LWE
- Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing
- Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage
- Security-enhanced public-key authenticated searchable encryption
- Public key authenticated encryption with keyword search improved: strong security model and multi-keyword construction
Cites work
- scientific article; zbMATH DE number 1256724 (Why is no real title available?)
- scientific article; zbMATH DE number 2086698 (Why is no real title available?)
- scientific article; zbMATH DE number 1418310 (Why is no real title available?)
- A forward-secure public-key encryption scheme
- Advances in Cryptology - EUROCRYPT 2004
- An efficient and parallel Gaussian sampler for lattices
- An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
- Bonsai trees, or how to delegate a lattice basis
- Efficient lattice (H)IBE in the standard model
- Efficient password authenticated key exchange via oblivious transfer
- Fuzzy asymmetric password-authenticated key exchange
- Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption
- Improved security model for public-key authenticated encryption with keyword search
- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
- Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage
- OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks
- Password-authenticated key exchange from group actions
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Public key authenticated encryption with keyword search from LWE
- Public-key authenticated encryption with keyword search revisited: security model and constructions
- Round-optimal password-based authenticated key exchange
- Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing
- Smooth projective hashing and password-based authenticated key exchange from lattices
- Trapdoors for hard lattices and new cryptographic constructions
- Trapdoors for lattices: simpler, tighter, faster, smaller
Cited in
(2)
This page was built for publication: Post-quantum public-key authenticated searchable encryption with forward security: general construction, and applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6573667)