2020
DOI: 10.1007/978-3-030-64834-3_14
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Group Actions and Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
39
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 75 publications
(39 citation statements)
references
References 68 publications
0
39
0
Order By: Relevance
“…Observe that all the requirements in the previous definitions lead to an efficient (and then, effective) use of the action in a protocol. In order to use them in cryptography we need some computational assumptions, as defined in [3]. With P[A] we denote the probability of the event A.…”
Section: Cryptographic Assumptionsmentioning
confidence: 99%
See 4 more Smart Citations
“…Observe that all the requirements in the previous definitions lead to an efficient (and then, effective) use of the action in a protocol. In order to use them in cryptography we need some computational assumptions, as defined in [3]. With P[A] we denote the probability of the event A.…”
Section: Cryptographic Assumptionsmentioning
confidence: 99%
“…In [3], they define concepts of one-way function and weakly unpredictable and weakly pseudorandom permutations. To ease the notation, we directly define these concepts in terms of group actions.…”
Section: Cryptographic Assumptionsmentioning
confidence: 99%
See 3 more Smart Citations