Public Key Authenticated Encryption with Keyword Search from LWE
- 25 September 2022
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 25 references indexed in Scilit:
- Bonsai Trees, or How to Delegate a Lattice BasisJournal of Cryptology, 2011
- Generating Shorter Bases for Hard Random LatticesTheory of Computing Systems, 2010
- Efficient Lattice (H)IBE in the Standard ModelLecture Notes in Computer Science, 2010
- On lattices, learning with errors, random linear codes, and cryptographyJournal of the ACM, 2009
- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning ProblemsLecture Notes in Computer Science, 2009
- On the Amortized Complexity of Zero-Knowledge ProtocolsLecture Notes in Computer Science, 2009
- Privacy Preserving Keyword Searches on Remote Encrypted DataLecture Notes in Computer Science, 2005
- Public Key Encryption with Keyword SearchLecture Notes in Computer Science, 2004
- Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key EncryptionLecture Notes in Computer Science, 2002
- Generating Hard Instances of the Short Basis ProblemLecture Notes in Computer Science, 1999