Post-quantum public-key authenticated searchable encryption with forward security: general construction, and applications
From MaRDI portal
Publication:6573667
DOI10.1007/978-981-97-0942-7_14zbMATH Open1543.94762MaRDI QIDQ6573667FDOQ6573667
Authors: Shiyuan Xu, Yibo Cao, Xue Chen, Yanmin Zhao, S. M. Yiu
Publication date: 17 July 2024
Recommendations
- Public key authenticated encryption with keyword search from LWE
- Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing
- Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage
- Security-enhanced public-key authenticated searchable encryption
- Public key authenticated encryption with keyword search improved: strong security model and multi-keyword construction
latticeforward securitygeneric constructionpublic-key authenticated encryption with keyword searchtrapdoor privacymulti-ciphertext indistinguishability
Cites Work
- Trapdoors for hard lattices and new cryptographic constructions
- Efficient lattice (H)IBE in the standard model
- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Trapdoors for lattices: simpler, tighter, faster, smaller
- Efficient password authenticated key exchange via oblivious transfer
- Smooth projective hashing and password-based authenticated key exchange from lattices
- Round-optimal password-based authenticated key exchange
- Title not available (Why is that?)
- Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption
- A forward-secure public-key encryption scheme
- Bonsai trees, or how to delegate a lattice basis
- An efficient and parallel Gaussian sampler for lattices
- OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks
- An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
- Fuzzy asymmetric password-authenticated key exchange
- Public-key authenticated encryption with keyword search revisited: security model and constructions
- Improved security model for public-key authenticated encryption with keyword search
- Public key authenticated encryption with keyword search from LWE
- Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage
- Password-authenticated key exchange from group actions
- Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing
Cited In (2)
This page was built for publication: Post-quantum public-key authenticated searchable encryption with forward security: general construction, and applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6573667)