Pages that link to "Item:Q2849390"
From MaRDI portal
The following pages link to An Algebraic Framework for Diffie-Hellman Assumptions (Q2849390):
Displayed 50 items.
- An algebraic framework for Diffie-Hellman assumptions (Q514473) (← links)
- IBE with tight security against selective opening and chosen-ciphertext attacks (Q780378) (← links)
- SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions (Q831176) (← links)
- Smooth NIZK arguments (Q1629410) (← links)
- Quantum algorithms for the \(k\)-XOR problem (Q1633472) (← links)
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system (Q1647557) (← links)
- Unbounded ABE via bilinear entropy expansion, revisited (Q1648812) (← links)
- Shorter quasi-adaptive NIZK proofs for linear subspaces (Q1698397) (← links)
- Improved inner-product encryption with adaptive security and full attribute-hiding (Q1710620) (← links)
- Decentralized multi-client functional encryption for inner product (Q1710623) (← links)
- Simple and more efficient PRFs with tight security from LWE and matrix-DDH (Q1710687) (← links)
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings (Q1752551) (← links)
- Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis (Q1787193) (← links)
- Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs (Q1791668) (← links)
- Related-key security for pseudorandom functions beyond the linear barrier (Q1994635) (← links)
- On subversion-resistant SNARKs (Q2039405) (← links)
- Simple and efficient FE for quadratic functions (Q2043408) (← links)
- Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \) (Q2055654) (← links)
- Adaptively secure ABE for DFA from \(k\)-Lin and more (Q2055655) (← links)
- New constructions of statistical NIZKs: dual-mode DV-NIZKs and more (Q2055662) (← links)
- Tightly CCA-secure inner product functional encryption scheme (Q2055966) (← links)
- Tightly-secure authenticated key exchange, revisited (Q2056675) (← links)
- Master-key KDM-secure ABE via predicate encoding (Q2061934) (← links)
- Functional encryption for attribute-weighted sums from \(k\)-Lin (Q2096503) (← links)
- Dynamic decentralized functional encryption (Q2096508) (← links)
- Generic transformation from broadcast encryption to round-optimal deniable ring authentication (Q2115719) (← links)
- Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin (Q2139632) (← links)
- Fine-grained secure attribute-based encryption (Q2139633) (← links)
- Authenticated key exchange and signatures with tight security in the standard model (Q2139653) (← links)
- Signatures of knowledge for Boolean circuits under standard assumptions (Q2143135) (← links)
- Somewhere statistically binding commitment schemes with applications (Q2145407) (← links)
- Subversion-resistant quasi-adaptive NIZK and applications to modular zk-SNARKs (Q2149845) (← links)
- Subversion-resilient enhanced privacy ID (Q2152180) (← links)
- Generic constructions for fully secure revocable attribute-based encryption (Q2167729) (← links)
- Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin (Q2188962) (← links)
- Multilinear maps from obfuscation (Q2188963) (← links)
- Improving the efficiency of re-randomizable and replayable CCA secure public key encryption (Q2229277) (← links)
- Structure-preserving public-key encryption with leakage-resilient CCA security (Q2330095) (← links)
- Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness (Q2413008) (← links)
- A generic construction of tightly secure signatures in the multi-user setting (Q2419110) (← links)
- QANIZK for adversary-dependent languages and their applications (Q2420581) (← links)
- Automated analysis of cryptographic assumptions in generic group models (Q2423840) (← links)
- Hardware security without secure hardware: how to decrypt with a password and a server (Q2664944) (← links)
- Blind key-generation attribute-based encryption for general predicates (Q2673977) (← links)
- Succinct and adaptively secure ABE for ABP from \(k\)-Lin (Q2691593) (← links)
- Unbounded HIBE with tight security (Q2692379) (← links)
- Two-pass authenticated key exchange with explicit authentication and tight security (Q2692405) (← links)
- Statistical ZAPs from group-based assumptions (Q2695645) (← links)
- Fully-succinct publicly verifiable delegation from constant-size assumptions (Q2695648) (← links)
- Towards tight adaptive security of non-interactive key exchange (Q2697896) (← links)