Limits on the power of prime-order groups: separating Q-type from static assumptions
From MaRDI portal
Publication:6652960
DOI10.1007/978-3-031-68388-6_3MaRDI QIDQ6652960
Mark Zhandry, George Jingfeng Lu
Publication date: 13 December 2024
Cites Work
- Unnamed Item
- The algebraic group model and its applications
- Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin
- The distinction between fixed and random generators in group-based assumptions
- Déjà Q: Encore! Un Petit IBE
- Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures
- Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
- A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups
- Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions
- Decentralizing Attribute-Based Encryption
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
- Security Analysis of the Strong Diffie-Hellman Problem
- Hierarchical Predicate Encryption for Inner-Products
- Probabilistic Algorithms in Finite Fields
- A New Algorithm for Factoring Polynomials Over Finite Fields
- Breaking RSA may not be equivalent to factoring
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Déjà Q: Using Dual Systems to Revisit q-Type Assumptions
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Theory of Cryptography
- Cryptography and Coding
- Theory of Cryptography
- To label, or not to label (in generic groups)
This page was built for publication: Limits on the power of prime-order groups: separating Q-type from static assumptions