Pages that link to "Item:Q2914299"
From MaRDI portal
The following pages link to Secure Identity-Based Encryption in the Quantum Random Oracle Model (Q2914299):
Displaying 24 items.
- Cryptanalysis and improvement of verifiable quantum \((k,n)\) secret sharing (Q264629) (← links)
- Short variable length domain extenders with beyond birthday bound security (Q1633453) (← links)
- Building quantum-one-way functions from block ciphers: Davies-Meyer and Merkle-Damgård constructions (Q1633456) (← links)
- Traceable ring signatures: general framework and post-quantum security (Q2034982) (← links)
- Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption (Q2035455) (← links)
- Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity (Q2043417) (← links)
- Signatures from sequential-OR proofs (Q2055653) (← links)
- Generic authenticated key exchange in the quantum random oracle model (Q2055699) (← links)
- Classical vs quantum random oracles (Q2056754) (← links)
- A new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKs (Q2128576) (← links)
- Anonymous, robust post-quantum public key encryption (Q2170096) (← links)
- Watermarking PRFs against quantum adversaries (Q2170100) (← links)
- Succinct arguments in the quantum random oracle model (Q2175929) (← links)
- Being a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitives (Q2220875) (← links)
- A combinatorial approach to quantum random functions (Q2692397) (← links)
- Classical binding for quantum commitments (Q2695637) (← links)
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes (Q2829951) (← links)
- Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World (Q2975804) (← links)
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms (Q3181027) (← links)
- Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting (Q3297618) (← links)
- Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security (Q5041241) (← links)
- Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts (Q5270358) (← links)
- Tighter security proofs for GPV-IBE in the quantum random oracle model (Q5925501) (← links)
- Lattice-based programmable hash functions and applications (Q6182001) (← links)