Cryptography and Coding

From MaRDI portal
Publication:5897509

DOI10.1007/11586821zbMath1122.94040OpenAlexW2619930404MaRDI QIDQ5897509

Ueli M. Maurer

Publication date: 1 November 2006

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11586821




Related Items (67)

Signed Diffie-Hellman key exchange with tight securityTight state-restoration soundness in the algebraic group modelFine-grained secure attribute-based encryptionDoes Fiat-Shamir require a cryptographic hash function?On the analysis of cryptographic assumptions in the generic ring modelA Leakage Resilient MACBootstrapping for approximate homomorphic encryptionMore efficient structure-preserving signatures -- or: bypassing the type-III lower boundsOn succinct non-interactive arguments in relativized worldsA fast and simple partially oblivious PRF, with applicationsShort pairing-free blind signatures with exponential securityOn the (In)security of Kilian-based SNARGsBlack-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way PermutationsThe One-More Discrete Logarithm Assumption in the Generic Group ModelMulti-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\)Almost tightly-secure re-randomizable and replayable CCA-secure public key encryptionA Shuffle Argument Secure in the Generic ModelA lower bound on the length of signatures based on group actions and generic isogeniesZero-knowledge arguments for subverted RSA groupsOn the security of functional encryption in the generic group modelIdentity-based encryption in DDH hard groupsHalf-aggregation of Schnorr signatures with tight reductionsAutomated analysis of cryptographic assumptions in generic group modelsOn tight security proofs for Schnorr signaturesHow to obfuscate MPC inputsOn the impossibility of algebraic vector commitments in pairing-free groupsThe Kernel Matrix Diffie-Hellman AssumptionMemory-tight multi-challenge security of public-key encryptionFine-grained non-interactive key-exchange: constructions and lower boundsAnonymous tokens with stronger metadata bit hiding from algebraic MACsThe pseudorandom oracle model and ideal obfuscationTo label, or not to label (in generic groups)The price of verifiability: lower bounds for verifiable random functionsBeyond Uber: instantiating generic groups via PGGsAn analysis of the algebraic group modelGroup homomorphic encryption: characterizations, impossibility results, and applicationsSnowblind: a threshold blind signature in pairing-free groupsPractical Schnorr threshold signatures without the algebraic group modelOn the impossibility of algebraic NIZK in pairing-free groupsOn the impossibility of purely algebraic signaturesBeyond eCK: perfect forward secrecy under actor compromise and ephemeral-key revealObfuscating conjunctionsArithmetic Expression Construction.Equivalences and Black-Box Separations of Matrix Diffie-Hellman ProblemsOn Removing Graded Encodings from Functional EncryptionFine-grained secure attribute-based encryptionObfuscating circuits via composite-order graded encodingOn subversion-resistant SNARKsOptimal broadcast encryption from pairings and LWEGeneric-group delay functions require hidden-order groupsEverybody's a target: scalability in public-key encryptionBreaking RSA Generically Is Equivalent to FactoringShorter Circuit Obfuscation in Challenging Security ModelsLinicrypt: A Model for Practical CryptographyEfficient fully structure-preserving signatures and shrinking commitmentsOn Related-Secret PseudorandomnessSigned (group) Diffie-Hellman key exchange with tight securityOn the Equivalence of Generic Group ModelsConjugacy systems based on nonabelian factorization problems and their applications in cryptographyA classification of computational assumptions in the algebraic group modelDon't tamper with dual system encryption. Beyond polynomial related-key security of IBEGenerically speeding-up repeated squaring is equivalent to factoring: sharp thresholds for all generic-ring delay functionsCryptography and algorithmic randomnessPartially structure-preserving signatures: lower bounds, constructions and moreTighter proofs for the SIGMA and TLS 1.3 key exchange protocolsOn the memory-tightness of hashed ElGamalOn instantiating the algebraic group model from falsifiable assumptions




This page was built for publication: Cryptography and Coding