[PDF][PDF] Research Online

VNT Le, B Apopei, K Alameh - Sciences, 2018 - academia.edu
Abstract© The Institution of Engineering and Technology 2019. The modulus switching
technique has been used in some cryptographic applications as well as in cryptanalysis. For …

A generic construction of CCA-secure deterministic encryption

M Huang, B Yang, Y Zhao, X Wang, Y Zhou… - Information Processing …, 2020 - Elsevier
Deterministic public-key encryption (D-PKE), introduced by Bellare, Boldyreva, and O'Neill
(CRYPTO'07), encrypts every plaintext into a unique ciphertext without using any …

Deterministic Identity‐Based Encryption from Lattice‐Based Programmable Hash Functions with High Min‐Entropy

D Zhang, J Li, B Li, X Lu, H Xue… - Security and …, 2019 - Wiley Online Library
There only exists one deterministic identity‐based encryption (DIBE) scheme which is
adaptively secure in the auxiliary‐input setting, under the learning with errors (LWE) …

Deterministic identity-based encryption from lattices with more compact public parameters

D Zhang, F Fang, B Li, X Wang - … , Japan, August 30–September 1, 2017 …, 2017 - Springer
Abstract Xie et al.(SCN 2012) proposed the first deterministic identity-based encryption
(DIBE) scheme with an adaptive security in the auxiliary-input setting, under the learning …

[PDF][PDF] Chosen-ciphertext Secure Hierarchical Identity-based Encryption from R-LWE

XF Jiang, T Wang, ZW Sun - Journal of Computers, 2020 - csroc.org.tw
Identity-based encryption (IBE) is a new public key encryption system, any string can be its
public key, private key is generated by the private key generator that owns the main private …

Impact of<? show [AQ ID= Q1]?> the modulus switching technique on some attacks against learning problems

HQ Le, PK Mishra, S Nakamura, K Kinjo… - IET Information …, 2020 - Wiley Online Library
The modulus switching technique has been used in some cryptographic applications as well
as in cryptanalysis. For cryptanalysis against the learning with errors (LWE) problem and the …

[PDF][PDF] CCA-Secure Deterministic Identity-Based Encryption Scheme.

M Huang, B Yang, Y Zhao, K Liang… - J. Univers …, 2019 - openresearch.surrey.ac.uk
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without
involving any randomness, was introduced by Bellare, Boldyreva, and O'Neill (CRYPTO …