Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Tightly Secure Signatures and Public-Key Encryption - MaRDI portal

Tightly Secure Signatures and Public-Key Encryption

From MaRDI portal
Publication:2914286

DOI10.1007/978-3-642-32009-5_35zbMath1296.94152OpenAlexW2404371125MaRDI QIDQ2914286

Dennis Hofheinz, Tibor Jager

Publication date: 25 September 2012

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-32009-5_35




Related Items (53)

Hierarchical Identity-Based Encryption with Tight Multi-challenge SecurityAlmost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreStructure-preserving signatures and commitments to group elementsOn the security loss of unique signaturesTightly secure signatures and public-key encryptionParameter-hiding order revealing encryptionStructure-Preserving Signatures from Standard Assumptions, RevisitedShort Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple AssumptionsConstant-size structure-preserving signatures: generic constructions and simple assumptionsSkipping the \(q\) in group signaturesOn black-box extension of a non-interactive zero-knowledge proof system for secret equalityShort, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofsMore efficient structure-preserving signatures -- or: bypassing the type-III lower boundsOptimal tightness for chain-based unique signaturesImproved, black-box, non-malleable encryption from semantic securityLinearly homomorphic structure-preserving signatures and their applicationsDigital Signatures with Memory-Tight Security in the Multi-challenge SettingA generic construction of tightly secure signatures in the multi-user settingTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionHow to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving OnesDéjà Q All Over Again: Tighter and Broader Reductions of q-Type AssumptionsIterated Random Oracle: A Universal Approach for Finding Loss in Security ReductionAlmost tight multi-user security under adaptive corruptions \& leakages in the standard modelMemory-tight multi-challenge security of public-key encryptionKey encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightnessIdentity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext settingTightly CCA-secure encryption scheme in a multi-user setting with corruptionsTowards tight adaptive security of non-interactive key exchangeAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsTight security for the generic construction of identity-based signature (in the multi-instance setting)On the tightness of forward-secure signature reductionsOn the impossibility of structure-preserving deterministic primitivesGeneralized public-key cryptography with tight securityTighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge SettingTightly secure inner product functional encryption: multi-input and function-hiding constructionsTightly secure ring signatures in the standard modelAn algebraic framework for Diffie-Hellman assumptionsTagged One-Time Signatures: Tight Security and Optimal Tag SizeStructure-Preserving Chosen-Ciphertext Security with Shorter Verifiable CiphertextsNon-Interactive Zero-Knowledge Proofs of Non-MembershipAlgebraic Partitioning: Fully Compact and (almost) Tightly Secure CryptographyTighter security proofs for GPV-IBE in the quantum random oracle modelTightly secure hierarchical identity-based encryptionSignatures from sequential-OR proofsMore efficient digital signatures with tight multi-user securityVerifiable random functions with optimal tightnessStructure-preserving public-key encryption with leakage-resilient CCA securityShort tightly secure signatures for signing a vector of group elements: a new approachTightly secure signature schemes from the LWE and subset sum assumptionsEfficient and tight oblivious transfer from PKE with tight multi-user securityShorter non-interactive zero-knowledge arguments and ZAPs for algebraic languagesAdaptive PartitioningShort identity-based signatures with tight security from lattices




This page was built for publication: Tightly Secure Signatures and Public-Key Encryption