Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,760 papers from all fields of science
Search
Sign In
Create Free Account
Decision Linear assumption
Known as:
Decisional Linear assumption
The Decision Linear (DLIN) assumption is a computational hardness assumption used in elliptic curve cryptography. In particular, the DLIN assumption…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Computational hardness assumption
Decisional Diffie–Hellman assumption
Pairing-based cryptography
Broader (1)
Elliptic curve cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Secure Fine-Grained Multi-Keyword Search with Protection from Key Abusers in the Cloud
Mamta
,
B. Gupta
Global Conference on Consumer Electronics
2019
Corpus ID: 211680475
A combination of attribute-based encryption and searchable encryption is used to enable fine-grained searching capability. This…
Expand
2018
2018
Fully Secure Functional Encryption with a Large Class of Relations from the Decisional Linear Assumption
T. Okamoto
,
K. Takashima
Journal of Cryptology
2018
Corpus ID: 54444856
This paper presents a fully secure (adaptively secure) practical functional encryption scheme for a large class of relations…
Expand
2018
2018
Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption
Masahito Ishizaka
,
Kanta Matsuura
Cryptology and Network Security
2018
Corpus ID: 52312199
Leakage-resilience guarantees that even if some information about the secret key is partially leaked, the security is maintained…
Expand
2016
2016
Practical Trade-Offs for Multi-Input Functional Encryption
M. Joye
,
Alain Passelègue
IACR Cryptology ePrint Archive
2016
Corpus ID: 15665511
Multi-input functional encryption is a paradigm that allows an authorized user to compute a certain function —and nothing more…
Expand
2016
2016
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups
Jongkil Kim
,
W. Susilo
,
Fuchun Guo
,
M. Au
International Conference on Security and…
2016
Corpus ID: 16686035
We introduce a tag based encoding, a new generic framework for modular design of Predicate Encryption PE schemes in prime order…
Expand
2014
2014
Flexible Attribute-Based Encryption, Revisited
A. Seiko
2014
Corpus ID: 54695714
Flexible attribute-based encryption, which is a variant of ciphertext-policy attributebase encryption, allows one to loosen a…
Expand
Highly Cited
2014
Highly Cited
2014
Dual System Groups and its Applications - Compact HIBE and More
Jie Chen
,
H. Wee
IACR Cryptology ePrint Archive
2014
Corpus ID: 14194138
We introduce the notion of dual system groups. – We show how to derive compact HIBE by instantiating the dual system framework in…
Expand
2011
2011
A Domain Transformation for Structure-Preserving Signatures on Group Elements
Melissa Chase
,
Markulf Kohlweiss
IACR Cryptology ePrint Archive
2011
Corpus ID: 10208904
We present a generic transformation that allows us to use a large class of pairing-based signatures to construct schemes for…
Expand
2010
2010
A Fully Anonymous Identity-Based Signcryption Scheme in the Standard Model
Hao Wang
,
Qiuliang Xu
,
Han Jiang
,
Xiufeng Zhao
International Conference on Computational…
2010
Corpus ID: 18533097
Anonymity of user is an important property in the cryptographic protocol, to protect the privacy of the participants. In this…
Expand
2009
2009
New DLOG-Based Convertible Undeniable Signature Schemes in the Standard Model
K. Kurosawa
,
W. Ogata
2009
Corpus ID: 14162283
We propose discrete-logarithm-based undeniable signature schemes supporting both selective and all conversion, with formal…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE