Identity-Based (Lossy) Trapdoor Functions and Applications
From MaRDI portal
Publication:2894410
DOI10.1007/978-3-642-29011-4_15zbMath1297.94047OpenAlexW2164761415WikidataQ59163688 ScholiaQ59163688MaRDI QIDQ2894410
Chris Peikert, Mihir Bellare, Brent Waters, Eike Kiltz
Publication date: 29 June 2012
Published in: Advances in Cryptology – EUROCRYPT 2012 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-29011-4_15
Related Items (16)
Adaptively secure distributed PRFs from LWE ⋮ Approximate-Deterministic Public Key Encryption from Hard Learning Problems ⋮ Faster Gaussian sampling for trapdoor lattices with arbitrary modulus ⋮ IBE Under $$k$$-LIN with Shorter Ciphertexts and Private Keys ⋮ Towards a Simpler Lattice Gadget Toolkit ⋮ Cumulatively all-lossy-but-one trapdoor functions from standard assumptions ⋮ How to build a trapdoor function from an encryption scheme ⋮ Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification ⋮ A generic construction of CCA-secure deterministic encryption ⋮ Tighter security proofs for GPV-IBE in the quantum random oracle model ⋮ Adaptively secure distributed PRFs from \(\mathsf{LWE}\) ⋮ CCA-security from adaptive all-but-one lossy trapdoor functions ⋮ Deterministic Public-Key Encryption Under Continual Leakage ⋮ IBE with tight security against selective opening and chosen-ciphertext attacks ⋮ A new Gaussian sampling for trapdoor lattices with arbitrary modulus ⋮ Adaptively secure constrained pseudorandom functions in the standard model
This page was built for publication: Identity-Based (Lossy) Trapdoor Functions and Applications