Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems

From MaRDI portal
Publication:3408195

DOI10.1007/978-3-642-11799-2_13zbMath1274.94040OpenAlexW1565128838MaRDI QIDQ3408195

Rikke Bendlin, Ivan B. Damgård

Publication date: 24 February 2010

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-11799-2_13




Related Items

Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based CryptographyEfficient lattice-based polynomial evaluation and batch ZK argumentsAdaptively secure distributed PRFs from LWEAdaptively secure threshold symmetric-key encryptionGladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed DecryptionEfficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryptionVerifiable decryption in the headMixed-technique multi-party computations composed of two-party computationsChosen-ciphertext secure code-based threshold public key encryptions with short ciphertextZero-knowledge protocols for the subset sum problem from MPC-in-the-head with rejectionParaDiSE: efficient threshold authenticated encryption in fully malicious modelAn efficient threshold access-structure for RLWE-based multiparty homomorphic encryptionImproved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and ApplicationsLattice-based identity-based resplittable threshold public key encryption schemeAdaptively secure distributed PRFs from \(\mathsf{LWE}\)Revocable attribute-based proxy re-encryptionThe Geometry of Lattice CryptographyNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsEfficient Threshold Encryption from Lossy Trapdoor FunctionsActively secure setup for SPDZ



Cites Work