A survey on cryptographic techniques for protecting big data security: present and forthcoming

S Lu, J Zheng, Z Cao, Y Wang, C Gu - Science China Information …, 2022 - Springer
Big data drive multidimensional convergence and profound innovations among industries
and provide novel ways of exploring the world. As they significantly create economic and …

Generic construction of public-key authenticated encryption with keyword search revisited: Stronger security and efficient construction

K Emura - Proceedings of the 9th ACM on ASIA Public-Key …, 2022 - dl.acm.org
Public-key encryption with keyword search (PEKS) does not provide trapdoor privacy, ie,
keyword information is leaked through trapdoors. To prevent this information leakage, public …

Multi-client functional encryption for linear functions in the standard model from LWE

B Libert, R Ţiţiu - International Conference on the Theory and …, 2019 - Springer
Multi-client functional encryption (MCFE) allows ℓ clients to encrypt ciphertexts (C _ t, 1, C _
t, 2, ..., C _ t, ℓ) under some label. Each client can encrypt his own data X_i for a label t using …

Efficient hybrid exact/relaxed lattice proofs and applications to rounding and VRFs

MF Esgin, R Steinfeld, D Liu, S Ruj - Annual International Cryptology …, 2023 - Springer
In this work, we study hybrid exact/relaxed zero-knowledge proofs from lattices, where the
proved relation is exact in one part and relaxed in the other. Such proofs arise in important …

Lattice-based revocable identity-based encryption with bounded decryption key exposure resistance

A Takayasu, Y Watanabe - … , ACISP 2017, Auckland, New Zealand, July 3 …, 2017 - Springer
A revocable identity-based encryption (RIBE) scheme, proposed by Boldyreva et al.,
provides a revocation functionality for managing a number of users dynamically and …

Verifiable random function from the Deuring correspondence and higher dimensional isogenies

A Leroux - 2023 - hal.science
In this paper, we introduce the family DeuringVRF y, z of Verifiable Random Function (VRF)
protocols. Based on isogenies between supersingular curves, the random function at the …

Generic constructions of revocable identity-based encryption

X Ma, D Lin - Information Security and Cryptology: 15th International …, 2020 - Springer
Revocable identity-based encryption (RIBE) is an extension of IBE which can support a key
revocation mechanism, and it is important when deploying an IBE system in practice. Boneh …

A lattice-based public key encryption with equality test in standard model

DH Duong, K Fukushima, S Kiyomoto, PS Roy… - Information Security and …, 2019 - Springer
Public key encryption with equality test (PKEET) allows testing whether two ciphertexts are
generated by the same message or not. PKEET is a potential candidate for many practical …

Funder: Future-Proof Unbiased Decentralized Randomness

Z Li, M Wang, TG Tan, J Zhou - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
A trustworthy source of randomness is a crucial component of many decentralized and
crypto-based application systems, especially blockchain consensus. A decentralized …

Adaptively secure constrained pseudorandom functions in the standard model

A Davidson, S Katsumata, R Nishimaki… - Annual International …, 2020 - Springer
Constrained pseudorandom functions (CPRFs) allow learning “constrained” PRF keys that
can evaluate the PRF on a subset of the input space, or based on some predicate. First …