TY - STD TI - Agrawal, S., Boneh D., Boyen X. (2010) Efficient lattice (H)IBE in the standard model In: Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings, 553–572. https://doi.org/10.1007/978-3-642-13190-5_28. ID - ref1 ER - TY - STD TI - Ajtai, M. (1999) Generating hard instances of the short basis problem In: ICALP 1999, 1–9. ID - ref2 ER - TY - STD TI - Alwen, J., Peikert C. (2009) Generating shorter bases for hard random lattices In: STOCS 2009, 75–86. ID - ref3 ER - TY - STD TI - Cash, D., Hofheinz D., Kiltz E., Peikert C. (2010) Bonsai trees, or how to delegate a lattice basis In: EUROCRYPT 2010, 523–552. ID - ref4 ER - TY - STD TI - Chow, SSM, Franklin MK, Zhang H (2014) Practical dual-receiver encryption - soundness, complete non-malleability, and applications In: Topics in Cryptology - CT-RSA 2014 - The Cryptographer’s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings, 85–105. https://dblp.org/rec/bib/conf/ctrsa/ChowFZ14. UR - https://dblp.org/rec/bib/conf/ctrsa/ChowFZ14 ID - ref5 ER - TY - STD TI - Diament, T, Lee HK, Keromytis AD, Yung M (2004) The dual receiver cryptosystem and its applications In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, 330–343. https://dblp.org/rec/bib/conf/ccs/DiamentLKY04. UR - https://dblp.org/rec/bib/conf/ccs/DiamentLKY04 ID - ref6 ER - TY - STD TI - Georgescu, A (2013) Anonymous lattice-based broadcast encryption In: Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings, 353–362. https://dblp.org/rec/bib/conf/ict-eurasia/Georgescu13. UR - https://dblp.org/rec/bib/conf/ict-eurasia/Georgescu13 ID - ref7 ER - TY - STD TI - Groth, J, Sahai A (2008) Efficient non-interactive proof systems for bilinear groups In: Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings, 415–432. https://dblp.org/rec/bib/conf/eurocrypt/GrothS08. UR - https://dblp.org/rec/bib/conf/eurocrypt/GrothS08 ID - ref8 ER - TY - STD TI - Joux, A (2000) A one round protocol for tripartite diffie-hellman In: Algorithmic Number Theory, 4th International Symposium, ANTS-IV, Leiden, The Netherlands, July 2-7, 2000, Proceedings, 385–394. https://dblp.org/rec/bib/conf/ants/Joux00. UR - https://dblp.org/rec/bib/conf/ants/Joux00 ID - ref9 ER - TY - STD TI - Katsumata, S, Yamada S (2016) Partitioning via non-linear polynomial functions: More compact ibes from ideal lattices and bilinear maps In: Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II, 682–712. http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/Katsumata016. UR - http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/Katsumata016 ID - ref10 ER - TY - STD TI - Kiltz, E (2006) Chosen-ciphertext security from tag-based encryption In: Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings, 581–600. https://dblp.org/rec/bib/conf/tcc/Kiltz06. UR - https://dblp.org/rec/bib/conf/tcc/Kiltz06 ID - ref11 ER - TY - STD TI - Libert, B, Paterson KG, Quaglia EA (2012) Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model In: Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, 206–224. https://dblp.org/rec/bib/conf/pkc/LibertPQ12. UR - https://dblp.org/rec/bib/conf/pkc/LibertPQ12 ID - ref12 ER - TY - STD TI - Micciancio, D, Peikert C (2012) Trapdoors for lattices: Simpler, tighter, faster, smaller In: Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings, 700–718. http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/MicciancioP12. UR - http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/MicciancioP12 ID - ref13 ER - TY - STD TI - Naor, M, Yung M (1990) Public-key cryptosystems provably secure against chosen ciphertext attacks In: Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, STOC 1990, May 13-17, 1990, Baltimore, Maryland, USA, 427–437. https://dblp.org/rec/bib/conf/stoc/NaorY90. UR - https://dblp.org/rec/bib/conf/stoc/NaorY90 ID - ref14 ER - TY - JOUR AU - Peikert, C. AU - Waters, B. PY - 2011 DA - 2011// TI - Lossy trapdoor functions and their applications JO - SIAM J Comput VL - 40 UR - https://doi.org/10.1137/080733954 DO - 10.1137/080733954 ID - Peikert2011 ER - TY - STD TI - Regev, O (2005) On lattices, learning with errors, random linear codes, and cryptography In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, STOC 2005, Baltimore, MD, USA, May 22-24, 2005, 84–93. http://dblp.uni-trier.de/rec/bib/conf/stoc/Regev05. UR - http://dblp.uni-trier.de/rec/bib/conf/stoc/Regev05 ID - ref16 ER - TY - JOUR AU - Wang, J. AU - Bi, J. PY - 2010 DA - 2010// TI - Lattice-based identity-based broadcast encryption scheme JO - IACR Cryptology ePrint Archive VL - 2010 ID - Wang2010 ER - TY - JOUR AU - Wang, F. AU - Wang, X. A. AU - Wang, C. PY - 2015 DA - 2015// TI - Lattice-based dynamical and anonymous broadcast encryption scheme for wireless ad hoc networks JO - J Interconnection Netw VL - 15 ID - Wang2015 ER - TY - STD TI - Waters, B (2005) Efficient identity-based encryption without random oracles In: Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, 114–127. https://dblp.org/rec/bib/conf/eurocrypt/Waters05. UR - https://dblp.org/rec/bib/conf/eurocrypt/Waters05 ID - ref19 ER - TY - STD TI - Yamada, S (2016) Adaptively secure identity-based encryption from lattices with asymptotically shorter public parameters In: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, 32–62. http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/Yamada16. UR - http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/Yamada16 ID - ref20 ER - TY - STD TI - Yamada, S (2017) Asymptotically compact adaptively secure lattice ibes and verifiable random functions via generalized partitioning techniques In: Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III, 161–193. http://dblp.org/rec/bib/conf/crypto/Yamada17. UR - http://dblp.org/rec/bib/conf/crypto/Yamada17 ID - ref21 ER - TY - STD TI - Zhang, K, Chen W, Li X, Chen J, Qian H (2016a) New application of partitioning methodology: identity-based dual receiver encryption. Secur Commun Netw 9(18):5789–5802. ID - ref22 ER - TY - STD TI - Zhang, J, Chen Y, Zhang Z (2016b) Programmable hash functions from lattices: Short signatures and ibes with small key sizes In: Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III, 303–332. http://dblp.uni-trier.de/rec/bib/conf/crypto/ZhangCZ16. UR - http://dblp.uni-trier.de/rec/bib/conf/crypto/ZhangCZ16 ID - ref23 ER - TY - STD TI - Zhang, D., Li J., Li B., Lu X., Xue H., Jia D., Liu Y. (2019) Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy, 1816393:1–1816393:12. https://doi.org/10.1155/2019/1816393. ID - ref24 ER - TY - STD TI - Zhang, D, Zhang K, Li B, Lu X, Xue H, Li J (2018b) Lattice-based dual receiver encryption and more In: ACISP 2018, 520–538. https://dblp.org/rec/bib/conf/acisp/ZhangZLLXL18. UR - https://dblp.org/rec/bib/conf/acisp/ZhangZLLXL18 ID - ref25 ER -