Efficient lattice (H) IBE in the standard model

S Agrawal, D Boneh, X Boyen - … on the Theory and Applications of …, 2010 - Springer
We construct an efficient identity based encryption system based on the standard learning
with errors (LWE) problem. Our security proof holds in the standard model. The key step in …

[图书][B] Digital signatures

J Katz - 2010 - Springer
As a beginning graduate student, I recall being frustrated by a general lack of acces sible
sources from which I could learn about (theoretical) cryptography. I remember wondering …

Short attribute-based signatures for threshold predicates

J Herranz, F Laguillaumie, B Libert, C Rafols - Cryptographers' Track at the …, 2012 - Springer
Attribute-based cryptography is a natural solution for fine-grained access control with
respect to security policies. In the case of attribute-based signatures (ABS), users obtain …

Concise mercurial vector commitments and independent zero-knowledge sets with short proofs

B Libert, M Yung - Theory of Cryptography Conference, 2010 - Springer
Abstract Introduced by Micali, Rabin and Kilian (MRK), the basic primitive of zero-knowledge
sets (ZKS) allows a prover to commit to a secret set S so as to be able to prove statements …

Linearly homomorphic structure-preserving signatures and their applications

B Libert, T Peters, M Joye, M Yung - Designs, Codes and Cryptography, 2015 - Springer
Abstract Structure-preserving signatures (SPS) are signature schemes where messages,
signatures and public keys all consist of elements of a group over which a bilinear map is …

Short and stateless signatures from the RSA assumption

S Hohenberger, B Waters - Annual International Cryptology Conference, 2009 - Springer
We present the first signature scheme which is “short”, stateless and secure under the RSA
assumption in the standard model. Prior short, standard model signatures in the RSA setting …

Scalable group signatures with revocation

B Libert, T Peters, M Yung - … 2012: 31st Annual International Conference on …, 2012 - Springer
Group signatures are a central cryptographic primitive, simultaneously supporting
accountability and anonymity. They allow users to anonymously sign messages on behalf of …

Improved security for linearly homomorphic signatures: A generic framework

DM Freeman - Public Key Cryptography–PKC 2012: 15th International …, 2012 - Springer
We propose a general framework that converts (ordinary) signature schemes having certain
properties into linearly homomorphic signature schemes, ie, schemes that allow …

A comprehensive review on collision-resistant hash functions on lattices

N Mishra, SKH Islam, S Zeadally - Journal of Information Security and …, 2021 - Elsevier
Hash functions have always attracted a lot of attention in modern cryptography because of
their hard to invert nature. However, all previous constructions of cryptographic primitives …

Instantiating random oracles via UCEs

M Bellare, VT Hoang, S Keelveedhi - Annual Cryptology Conference, 2013 - Springer
This paper provides a (standard-model) notion of security for (keyed) hash functions, called
UCE, that we show enables instantiation of random oracles (ROs) in a fairly broad and …