There is surprisingly little consensus on the precise role of the generator g in group-based assumptions such as DDH. Some works consider g to be a fixed part of the group …
We provide constructions of multilinear groups equipped with natural hard problems from indistinguishability obfuscation, homomorphic encryption, and NIZKs. This complements …
Access control and authorization in universal basic services is one of the main security issues in distributed systems. In particular, access control in distributed systems, such as in …
D Khurana, V Rao, A Sahai - International Conference on the Theory and …, 2015 - Springer
Existing protocols for non-interactive multi-party key exchange either (1) support a bounded number of users,(2) require a trusted setup, or (3) rely on knowledge-type assumptions. We …
J Partala - Journal of Mathematical Cryptology, 2018 - degruyter.com
Abstract The Diffie–Hellman key exchange scheme is one of the earliest and most widely used public-key primitives. Its underlying algebraic structure is a cyclic group and its security …
H Zhang, T Huang, F Zhang, B Wei, Y Du - Information, 2024 - mdpi.com
A bilinear map whose domain and target sets are identical is called a self-bilinear map. Original self-bilinear maps are defined over cyclic groups. Since the map itself reveals …
M Horváth, L Buttyán - Cryptology ePrint Archive, 2015 - eprint.iacr.org
The first candidate indistinguishability obfuscator (iO) of Garg et al.(FOCS 2013) changed the previously pessimistic attitude towards general-purpose cryptographic obfuscation. The …
H Zhang, T Huang, F Zhang, B Wei… - Information (2078 …, 2024 - search.ebscohost.com
A bilinear map whose domain and target sets are identical is called a self-bilinear map. Original self-bilinear maps are defined over cyclic groups. Since the map itself reveals …