Automated analysis of cryptographic assumptions in generic group models
From MaRDI portal
Publication:2423840
DOI10.1007/s00145-018-9302-3zbMath1434.94057OpenAlexW3194642185MaRDI QIDQ2423840
Dario Fiore, Benedikt Schmidt, Edvard Fagerholm, Gilles Barthe, John C. Mitchell, Andrej Scedrov
Publication date: 20 June 2019
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-018-9302-3
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Practical functional encryption for quadratic functions with applications to predicate encryption
- Complexity of a determinate algorithm for the discrete logarithm
- Predicate encryption supporting disjunctions, polynomial equations, and inner products
- Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures
- An Algebraic Framework for Diffie-Hellman Assumptions
- Security Protocol Verification: Symbolic and Computational Models
- Solving Non-linear Arithmetic
- Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials
- Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds
- The Semi-Generic Group Model and Applications to Pairing-Based Cryptography
- Diffie-Hellman Oracles
- A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions
- Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- The Uber-Assumption Family
- A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness
- Fast Probabilistic Algorithms for Verification of Polynomial Identities
- The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions
- Automated Reasoning
- Advances in Cryptology - EUROCRYPT 2004
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Advances in Cryptology - CRYPTO 2003
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Witness encryption and its applications
- On the Equivalence of Generic Group Models
- Theory of Cryptography
- Financial Cryptography and Data Security
- Solution of a problem of Tarski
- Cryptography and Coding
- Types for Proofs and Programs
This page was built for publication: Automated analysis of cryptographic assumptions in generic group models