Sciweavers

84
Voted
PKC
2015
Springer
20views Cryptology» more  PKC 2015»
9 years 11 months ago
Predicate Encryption for Multi-dimensional Range Queries from Lattices
Abstract. We construct a lattice-based predicate encryption scheme for multi-dimensional range and multidimensional subset queries. Our scheme is selectively secure and weakly attr...
Romain Gay, Pierrick Méaux, Hoeteck Wee
84
Voted
PKC
2015
Springer
21views Cryptology» more  PKC 2015»
9 years 11 months ago
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
Abstract. We investigate the security of the family of MQQ public key cryptosystems using multivariate quadratic quasigroups (MQQ). These cryptosystems show especially good perform...
Jean-Charles Faugère, Danilo Gligoroski, Lu...
77
Voted
PKC
2015
Springer
7views Cryptology» more  PKC 2015»
9 years 11 months ago
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based
We introduce a lattice-based group signature scheme that provides several noticeable improvements over the contemporary ones: simpler construction, weaker hardness assumptions, and...
San Ling, Khoa Nguyen, Huaxiong Wang
79
Voted
PKC
2015
Springer
6views Cryptology» more  PKC 2015»
9 years 11 months ago
Tightly-Secure Signatures from Chameleon Hash Functions
Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin ...
79
Voted
PKC
2015
Springer
9views Cryptology» more  PKC 2015»
9 years 11 months ago
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
We construct an identity-based encryption (IBE) scheme that is tightly secure in a very strong sense. Specifically, we consider a setting with many instances of the scheme and ma...
Dennis Hofheinz, Jessica Koch, Christoph Striecks