Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
The Group of Signed Quadratic Residues and Applications - MaRDI portal

The Group of Signed Quadratic Residues and Applications

From MaRDI portal
Publication:3183589

DOI10.1007/978-3-642-03356-8_37zbMath1252.94073OpenAlexW1536074886WikidataQ59163731 ScholiaQ59163731MaRDI QIDQ3183589

Eike Kiltz, Dennis Hofheinz

Publication date: 20 October 2009

Published in: Advances in Cryptology - CRYPTO 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-03356-8_37




Related Items (22)

Signed Diffie-Hellman key exchange with tight securityTwo-round adaptively secure multiparty computation from standard assumptionsSuper-strong RKA secure MAC, PKE and SE from tag-based hash proof systemA black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreementInstantiability of RSA-OAEP under chosen-plaintext attackSelf-bilinear map on unknown order groups from indistinguishability obfuscation and its applicationsCertifying giant nonprimesPPAD is as hard as LWE and iterated squaringSimple and efficient batch verification techniques for verifiable delay functionsAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsStrongly secure authenticated key exchange from factoring, codes, and latticesAn applications of signed quadratic residues in public key cryptographyGeneric hardness of inversion on ring and its relation to self-bilinear mapNon-Interactive Key ExchangeNew Constructions and Applications of Trapdoor DDH GroupsSecure ElGamal-Type Cryptosystems Without Message EncodingGeneralized Hardness Assumption for Self-bilinear Map with Auxiliary InformationSimple verifiable delay functionsAdversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup ModuliA Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search ProblemsSigned (group) Diffie-Hellman key exchange with tight securityAdaptive Partitioning




This page was built for publication: The Group of Signed Quadratic Residues and Applications