Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps

From MaRDI portal
Publication:2953793

DOI10.1007/978-3-662-53890-6_23zbMath1407.94126OpenAlexW2899523861MaRDI QIDQ2953793

Shota Yamada, Shuichi Katsumata

Publication date: 6 January 2017

Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-53890-6_23




Related Items (23)

Almost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreAdaptively secure distributed PRFs from LWEAttribute-based access control for inner product functional encryption from LWE\texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryptionFully collusion resistant trace-and-revoke functional encryption for arbitrary identities(Inner-product) functional encryption with updatable ciphertextsEfficient lattice-based inner-product functional encryptionGeneric construction of trace-and-revoke inner product functional encryptionLattice-based programmable hash functions and applicationsRing-based identity based encryption -- asymptotically shorter MPK and tighter securityDirect computation of branching programs and its applications to more efficient lattice-based cryptographyRevocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and moreCompact Hierarchical IBE from Lattices in the Standard ModelEfficient public-key encryption with equality test from latticesA more efficient leveled strongly-unforgeable fully homomorphic signature schemeTighter security proofs for GPV-IBE in the quantum random oracle modelAdaptively secure distributed PRFs from \(\mathsf{LWE}\)Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymityChosen ciphertext attacks secure inner-product functional encryption from learning with errors assumptionEfficient adaptively-secure IB-KEMs and VRFs via near-collision resistanceIdentity-based encryption with security against the KGC: a formal model and its instantiationsAdaptively secure constrained pseudorandom functions in the standard modelLattice-based revocable (hierarchical) IBE with decryption key exposure resistance


Uses Software


Cites Work


This page was built for publication: Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps