Covercrypt: an efficient early-abort KEM for hidden access policies with traceability from the DDH and LWE
From MaRDI portal
Publication:6550634
DOI10.1007/978-3-031-50594-2_19MaRDI QIDQ6550634
Paola de Perthuis, David Pointcheval, Théophile Brézot
Publication date: 5 June 2024
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Improved anonymous broadcast encryptions -- tight security and shorter ciphertext
- KEM combiners
- Hybrid key encapsulation mechanisms and authenticated key exchange
- Worst-case to average-case reductions for module lattices
- ABE for DFA from LWE against bounded collusions, revisited
- Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
- Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
- A Pseudorandom Generator from any One-way Function
- Pseudorandom generators with long stretch and low locality from random local one-way functions
- Public Key Cryptography - PKC 2006
- Post-quantum anonymity of Kyber
This page was built for publication: Covercrypt: an efficient early-abort KEM for hidden access policies with traceability from the DDH and LWE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6550634)