Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Programmable Hash Functions in the Multilinear Setting - MaRDI portal

Programmable Hash Functions in the Multilinear Setting

From MaRDI portal
Publication:2845692

DOI10.1007/978-3-642-40041-4_28zbMath1310.94145OpenAlexW199192073MaRDI QIDQ2845692

Kenneth G. Paterson, Eduarda S. V. Freire, Dennis Hofheinz, Christoph Striecks

Publication date: 2 September 2013

Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-40041-4_28




Related Items (20)

Adaptively secure distributed PRFs from LWEProgrammable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public KeysPublic-key authenticated encryption with keyword search revisited: security model and constructionsHomomorphic signatures with sublinear public keys via asymmetric programmable hash functionsThe random oracle model: a twenty-year retrospectiveMultilinear maps from obfuscationMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationPrivately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomnessBatch arguments for \textsf{NP} and more from standard bilinear group assumptionsLocally verifiable signature and key aggregationLattice-based programmable hash functions and applicationsIdentity-based aggregate signcryption in the standard model from multilinear mapsVerifiable Random Functions from Standard AssumptionsMultilinear Maps from ObfuscationFuzzy matching and direct revocation: a new CP-ABE scheme from multilinear mapsAdaptively secure distributed PRFs from \(\mathsf{LWE}\)Constrained PRFs for Unbounded Inputs with Short KeysEfficient adaptively-secure IB-KEMs and VRFs via near-collision resistanceProgrammable Hash Functions from Lattices: Short Signatures and IBEs with Small Key SizesOn instantiating the algebraic group model from falsifiable assumptions






This page was built for publication: Programmable Hash Functions in the Multilinear Setting