On Instantiating the Algebraic Group Model from Falsifiable Assumptions
暂无分享,去创建一个
[1] Alexander W. Dent,et al. The Cramer-Shoup Encryption Scheme is Plaintext Aware in the Standard Model , 2006, IACR Cryptol. ePrint Arch..
[2] Richard J. Lipton,et al. Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract) , 1996, CRYPTO.
[3] Craig Gentry,et al. Candidate Multilinear Maps from Ideal Lattices , 2013, EUROCRYPT.
[4] Ueli Maurer,et al. Lower Bounds on Generic Algorithms in Groups , 1998, EUROCRYPT.
[5] Dan Boneh,et al. Breaking RSA May Not Be Equivalent to Factoring , 1998, EUROCRYPT.
[6] Jiaxin Pan,et al. Towards Instantiating the Algebraic Group Model , 2019, IACR Cryptol. ePrint Arch..
[7] Shafi Goldwasser,et al. Functional Signatures and Pseudorandom Functions , 2014, Public Key Cryptography.
[8] Kenneth G. Paterson,et al. Programmable Hash Functions in the Multilinear Setting , 2013, CRYPTO.
[9] Eike Kiltz,et al. Programmable Hash Functions and Their Applications , 2008, CRYPTO.
[10] Dennis Hofheinz,et al. Interactively Secure Groups from Obfuscation , 2018, IACR Cryptol. ePrint Arch..
[11] Adi Shamir,et al. Witness indistinguishable and witness hiding protocols , 1990, STOC '90.
[12] Nir Bitansky,et al. ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation , 2015, TCC.
[13] Brent Waters,et al. How to use indistinguishability obfuscation: deniable encryption, and more , 2014, IACR Cryptol. ePrint Arch..
[14] Brent Waters,et al. Constrained Pseudorandom Functions and Their Applications , 2013, ASIACRYPT.
[15] Dennis Hofheinz,et al. Dual-Mode NIZKs from Obfuscation , 2019, IACR Cryptol. ePrint Arch..
[16] Georg Fuchsbauer,et al. Blind Schnorr Signatures in the Algebraic Group Model , 2019, IACR Cryptol. ePrint Arch..
[17] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[18] Mihir Bellare,et al. The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols , 2004, CRYPTO.
[19] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[20] Ueli Maurer,et al. Abstract Models of Computation in Cryptography , 2005, IMACC.
[21] Brent Waters,et al. Replacing a Random Oracle: Full Domain Hash From Indistinguishability Obfuscation , 2014, IACR Cryptol. ePrint Arch..
[22] Dennis Hofheinz,et al. Graded Encoding Schemes from Obfuscation , 2018, Public Key Cryptography.
[23] V. Nechaev. Complexity of a determinate algorithm for the discrete logarithm , 1994 .
[24] Kenneth G. Paterson,et al. Multilinear Maps from Obfuscation , 2016, Journal of Cryptology.
[25] Brent Waters,et al. Targeted malleability: homomorphic encryption for restricted computations , 2012, ITCS '12.
[26] Chris Peikert,et al. Noninteractive Zero Knowledge for NP from (Plain) Learning With Errors , 2019, IACR Cryptol. ePrint Arch..
[27] Amit Sahai,et al. Efficient Non-interactive Proof Systems for Bilinear Groups , 2008, EUROCRYPT.
[28] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[29] Alexander W. Dent,et al. Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model , 2002, ASIACRYPT.
[30] Toshiaki Tanaka,et al. On the Existence of 3-Round Zero-Knowledge Protocols , 1998, CRYPTO.
[31] Aggelos Kiayias,et al. Delegatable pseudorandom functions and applications , 2013, IACR Cryptol. ePrint Arch..
[32] Nir Bitansky,et al. On the existence of extractable one-way functions , 2014, SIAM J. Comput..
[33] Ivan Damgård,et al. Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks , 1991, CRYPTO.
[34] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[35] Leonid A. Levin,et al. A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..
[36] Jean-Sébastien Coron,et al. On the Exact Security of Full Domain Hash , 2000, CRYPTO.
[37] Brent Waters,et al. Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures , 2013, CRYPTO.
[38] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[39] Pascal Paillier,et al. Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log , 2005, ASIACRYPT.
[40] Ronald Cramer,et al. Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption , 2001, EUROCRYPT.
[41] Moni Naor,et al. On Cryptographic Assumptions and Challenges , 2003, CRYPTO.
[42] Tibor Jager,et al. On Tight Security Proofs for Schnorr Signatures , 2014, ASIACRYPT.
[43] Ran Canetti,et al. Obfuscation of Probabilistic Circuits and Applications , 2015, TCC.
[44] Victor Shoup,et al. Lower Bounds for Discrete Logarithms and Related Problems , 1997, EUROCRYPT.
[45] Manoj Prabhakaran,et al. Rerandomizable RCCA Encryption , 2007, CRYPTO.
[46] Silvio Micali,et al. How to Construct Random Functions (Extended Abstract) , 1984, FOCS.
[47] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[48] Xavier Boyen,et al. The Uber-Assumption Family , 2008, Pairing.
[49] Victor Shoup,et al. Sequences of games: a tool for taming complexity in security proofs , 2004, IACR Cryptol. ePrint Arch..
[50] Eike Kiltz,et al. The Algebraic Group Model and its Applications , 2018, IACR Cryptol. ePrint Arch..