Verifiable random functions: relations to identity-based key encapsulation and new constructions
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 708808 (Why is no real title available?)
- scientific article; zbMATH DE number 1942446 (Why is no real title available?)
- scientific article; zbMATH DE number 2009960 (Why is no real title available?)
- scientific article; zbMATH DE number 2079926 (Why is no real title available?)
- scientific article; zbMATH DE number 2086699 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- scientific article; zbMATH DE number 1842510 (Why is no real title available?)
- scientific article; zbMATH DE number 1418320 (Why is no real title available?)
- scientific article; zbMATH DE number 2204782 (Why is no real title available?)
- A Pseudorandom Generator from any One-way Function
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- Bonsai trees, or how to delegate a lattice basis
- Bonsai trees, or how to delegate a lattice basis
- Bounded CCA2-Secure Encryption
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Constructing verifiable random functions with large input spaces
- Efficient Construction of (Distributed) Verifiable Random Functions
- Efficient Identity-Based Encryption Without Random Oracles
- Families of finite sets in which no set is covered by the union of \(r\) others
- Generic constructions of identity-based and certificateless kEMs
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- Identity-based cryptosystems and signature schemes
- Leftover Hash Lemma, Revisited
- New directions in cryptography
- Practical Identity-Based Encryption Without Random Oracles
- Public Key Cryptography - PKC 2005
- Realizing Hash-and-Sign Signatures under Standard Assumptions
- Security Analysis of the Strong Diffie-Hellman Problem
- Simulatable VRFs with Applications to Multi-theorem NIZK
- Theory of Cryptography
- Topics in Cryptology – CT-RSA 2004
- Uniqueness is a different story: impossibility of verifiable random functions from trapdoor permutations
- Updatable Zero-Knowledge Databases
- Verifiable Random Functions from Identity-Based Key Encapsulation
- Weak Verifiable Random Functions
Cited in
(10)- Subversion-resilient signatures: definitions, constructions and applications
- Verifiable Random Functions from Identity-Based Key Encapsulation
- Verifiable random functions from non-interactive witness-indistinguishable proofs
- Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions
- Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs
- Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques
- Verifiable random functions from standard assumptions
- Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance
- Verifiable random functions with optimal tightness
- Adaptively secure puncturable pseudorandom functions via puncturable identity-based KEMs
This page was built for publication: Verifiable random functions: relations to identity-based key encapsulation and new constructions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q744351)