Pages that link to "Item:Q1648813"
From MaRDI portal
The following pages link to Anonymous IBE, leakage resilience and circular security from new assumptions (Q1648813):
Displaying 35 items.
- Registration-based encryption: removing private-key generator from IBE (Q1629445) (← links)
- A simple construction of iO for Turing machines (Q1631340) (← links)
- Succinct garbling schemes from functional encryption through a local simulation paradigm (Q1631342) (← links)
- Anonymous IBE, leakage resilience and circular security from new assumptions (Q1648813) (← links)
- Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks (Q2061928) (← links)
- Universal proxy re-encryption (Q2061932) (← links)
- Incompressible encodings (Q2096497) (← links)
- Verifiable registration-based encryption (Q2096501) (← links)
- Chosen ciphertext security from injective trapdoor functions (Q2096512) (← links)
- Two-round oblivious transfer from CDH or LPN (Q2119032) (← links)
- Non-interactive batch arguments for NP from standard assumptions (Q2139642) (← links)
- Optimizing registration based encryption (Q2149790) (← links)
- Optimal bounded-collusion secure functional encryption (Q2175911) (← links)
- CPA-to-CCA transformation for KDM security (Q2175934) (← links)
- Adaptively secure garbling schemes for parallel computations (Q2175942) (← links)
- Efficient identity-based encryption with hierarchical key-insulation from HIBE (Q2232128) (← links)
- BKW meets Fourier new algorithms for LPN with sparse parities (Q2697880) (← links)
- Laconic private set intersection and applications (Q2697887) (← links)
- Amortizing rate-1 OT and applications to PIR and PSI (Q2697889) (← links)
- Ring-based identity based encryption -- asymptotically shorter MPK and tighter security (Q2697891) (← links)
- Updatable public key encryption in the standard model (Q2697895) (← links)
- Direct computation of branching programs and its applications to more efficient lattice-based cryptography (Q2698337) (← links)
- Master-Key KDM-Secure IBE from Pairings (Q5041155) (← links)
- Collusion Resistant Traitor Tracing from Learning with Errors (Q5130846) (← links)
- CCA security and trapdoor functions via key-dependent-message security (Q5918652) (← links)
- Minicrypt primitives with algebraic structure and applications (Q5925579) (← links)
- Anonymous (hierarchical) identity-based encryption from broader assumptions (Q6535125) (← links)
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices (Q6544463) (← links)
- Lower bounds on assumptions behind registration-based encryption (Q6582178) (← links)
- R3PO: reach-restricted reactive program obfuscation and its applications (Q6635820) (← links)
- Laconic branching programs from the Diffie-Hellman assumption (Q6635828) (← links)
- Dynamic collusion functional encryption and multi-authority attribute-based encryption (Q6635893) (← links)
- Towards compact identity-based encryption on ideal lattices (Q6636118) (← links)
- Lossy cryptography from code-based assumptions (Q6652889) (← links)
- Non-interactive zero-knowledge from LPN and MQ (Q6653050) (← links)