Post-quantum public-key authenticated searchable encryption with forward security: general construction, and applications
From MaRDI portal
Publication:6573667
DOI10.1007/978-981-97-0942-7_14zbMATH Open1543.94762MaRDI QIDQ6573667
Yanmin Zhao, Xue Chen, Siu-Ming Yiu, Shiyuan Xu, Yibo Cao
Publication date: 17 July 2024
latticeforward securitygeneric constructiontrapdoor privacypublic-key authenticated encryption with keyword searchmulti-ciphertext indistinguishability
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Round-optimal password-based authenticated key exchange
- OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks
- Bonsai trees, or how to delegate a lattice basis
- Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage
- An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
- A forward-secure public-key encryption scheme
- Public-key authenticated encryption with keyword search revisited: security model and constructions
- Fuzzy asymmetric password-authenticated key exchange
- Improved security model for public-key authenticated encryption with keyword search
- Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
- Efficient Password Authenticated Key Exchange via Oblivious Transfer
- Trapdoors for hard lattices and new cryptographic constructions
- Efficient Lattice (H)IBE in the Standard Model
- An Efficient and Parallel Gaussian Sampler for Lattices
- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
- Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Advances in Cryptology - EUROCRYPT 2004
- Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption
- Password-authenticated key exchange from group actions
- Public key authenticated encryption with keyword search from LWE
- Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing
This page was built for publication: Post-quantum public-key authenticated searchable encryption with forward security: general construction, and applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6573667)