×

Found 58 Documents (Results 1–58)

Private database access with HE-over-ORAM architecture. (English) Zbl 1459.68057

Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 172-191 (2015).
PDFBibTeX XMLCite
Full Text: DOI

Zeroizing without low-level zeroes: new MMAP attacks and their limitations. (English) Zbl 1375.94114

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 247-266 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Graph-induced multilinear maps from lattices. (English) Zbl 1315.94076

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 498-527 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Computing on the edge of chaos: structure and randomness in encrypted computation. (English) Zbl 1373.68225

Jang, Sun Young (ed.) et al., Proceedings of the International Congress of Mathematicians (ICM 2014), Seoul, Korea, August 13–21, 2014. Vol. IV: Invited lectures. Seoul: KM Kyung Moon Sa (ISBN 978-89-6105-807-0/hbk; 978-89-6105-803-2/set). 609-632 (2014).
PDFBibTeX XMLCite

On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. (English) Zbl 1336.94048

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 518-535 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Witness encryption from instance independent assumptions. (English) Zbl 1345.94064

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 426-443 (2014).
MSC:  94A60 68Q17
PDFBibTeX XMLCite
Full Text: DOI

Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. (English) Zbl 1327.94035

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 533-556 (2014).
MSC:  94A60 94C05
PDFBibTeX XMLCite
Full Text: DOI

Garbled RAM revisited. (English) Zbl 1332.94067

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 405-422 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Two-round secure MPC from indistinguishability obfuscation. (English) Zbl 1317.94109

Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 74-94 (2014).
MSC:  94A60 68Q17
PDFBibTeX XMLCite
Full Text: DOI

Optimizing ORAM and using it efficiently for secure computation. (English) Zbl 1315.94075

De Cristofaro, Emiliano (ed.) et al., Privacy enhancing technologies. 13th international symposium, PETS 2013, Bloomington, IN, USA, July 10–12, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39076-0/pbk). Lecture Notes in Computer Science 7981, 1-18 (2013).
MSC:  94A60 68P25
Full Text: DOI

Witness encryption and its applications. (English) Zbl 1293.94066

Proceedings of the 45th annual ACM symposium on theory of computing, STOC ’13. Palo Alto, CA, USA, June 1–4, 2013. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2029-0). 467-476 (2013).
MSC:  94A60 68Q17 94A62
PDFBibTeX XMLCite
Full Text: DOI

Private database queries using somewhat homomorphic encryption. (English) Zbl 1330.94037

Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25–28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 102-118 (2013).
MSC:  94A60 68P15
PDFBibTeX XMLCite
Full Text: DOI

Discrete Gaussian leftover hash lemma over infinite domains. (English) Zbl 1320.94059

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 97-116 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Attribute-based encryption for circuits from multilinear maps. (English) Zbl 1311.94080

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 479-499 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. (English) Zbl 1310.94148

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 75-92 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Quadratic span programs and succinct NIZKs without PCPs. (English) Zbl 1300.94056

Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 626-645 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Candidate multilinear maps from ideal lattices. (English) Zbl 1300.94055

Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 1-17 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Packed ciphertexts in LWE-based homomorphic encryption. (English) Zbl 1314.94058

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 1-13 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

(Leveled) fully homomorphic encryption without bootstrapping. (English) Zbl 1347.68120

Proceedings of the 3rd conference on innovations in theoretical computer science, ITCS’12, Cambridge, MA, USA, January 8–10, 2012. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1115-1). 309-325 (2012).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Ring switching in BGV-style homomorphic encryption. (English) Zbl 1310.94147

Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 19-37 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Homomorphic evaluation of the AES circuit. (English) Zbl 1296.94117

Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 850-867 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Better bootstrapping in fully homomorphic encryption. (English) Zbl 1290.94077

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 1-16 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fully homomorphic encryption with polylog overhead. (English) Zbl 1297.94071

Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 465-482 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fully homomorphic encryption without squashing using depth-3 arithmetic circuits. (English) Zbl 1292.94066

Ostrovsky, Rafail (ed.), Proceedings of the 2011 IEEE 52nd annual symposium on foundations of computer science – FOCS 2011, Palm Springs, CA, USA, October 22–25. Los Alamitos, CA: IEEE Computer Society (ISBN 978-0-7695-4571-4; 978-1-4577-1843-4/ebook). 107-116 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Separating succinct non-interactive arguments from all falsifiable assumptions. (English) Zbl 1288.94063

Proceedings of the 43rd annual ACM symposium on theory of computing, STOC ’11. San Jose, CA, USA, June 6–8, 2011. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-0691-1). 99-108 (2011).
PDFBibTeX XMLCite
Full Text: DOI

Implementing Gentry’s fully-homomorphic encryption scheme. (English) Zbl 1281.94026

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 129-148 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Non-interactive verifiable computing: outsourcing computation to untrusted workers. (English) Zbl 1284.68065

Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 465-482 (2010).
MSC:  68M12 94A62
PDFBibTeX XMLCite
Full Text: DOI

\(i\)-hop homomorphic encryption and rerandomizable Yao circuits. (English) Zbl 1280.94061

Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 155-172 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A simple BGN-type cryptosystem from LWE. (English) Zbl 1280.94060

Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 506-522 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fully homomorphic encryption over the integers. (English) Zbl 1279.94130

Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 24-43 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The geometry of provable security: some proofs of security in which lattices make a surprise appearance. (English) Zbl 1191.94089

Nguyen, Phong Q. (ed.) et al., The LLL algorithm. Survey and applications. Dordrecht: Springer (ISBN 978-3-642-02294-4/hbk; 978-3-642-02295-1/ebook). Information Security and Cryptography, 391-426 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fully homomorphic encryption using ideal lattices. (English) Zbl 1304.94059

Proceedings of the 41st annual ACM symposium on theory of computing, STOC ’09. Bethesda, MD, USA, May 31 – June 2, 2009. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-613-7). 169-178 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Adaptive security in broadcast encryption systems (with short ciphertexts). (English) Zbl 1239.94073

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 171-188 (2009).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Hierarchical identity based encryption with polynomially many levels. (English) Zbl 1213.94102

Reingold, Omer (ed.), Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00456-8/pbk). Lecture Notes in Computer Science 5444, 437-456 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Trapdoors for hard lattices and new cryptographic constructions. (English) Zbl 1231.68124

STOC’08. Proceedings of the 40th annual ACM symposium on theory of computing 2008, Victoria, Canada, May 17–20, 2008. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-047-0). 197-206 (2008).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Practical identity-based encryption without random oracles. (English) Zbl 1140.94340

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 445-464 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

A method for making password-based key exchange resilient to server compromise. (English) Zbl 1161.68440

Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 142-159 (2006).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Identity-based aggregate signatures. (English) Zbl 1151.94511

Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 257-273 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient designated confirmer signatures without random oracles or general zero-knowledge proofs. (English) Zbl 1154.94454

Roy, Bimal (ed.), Advances in cryptology – ASIACRYPT 2005. 11th international conference on the theory and application of cryptology and information security, Chennai, India, December 4–8, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30684-9/pbk). Lecture Notes in Computer Science 3788, 662-681 (2005).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Collusion resistant broadcast encryption with short ciphertexts and private keys. (English) Zbl 1145.94434

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 258-275 (2005).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Single-database private information retrieval with constant communication rate. (English) Zbl 1084.68043

Caires, Luís (ed.) et al., Automata, languages and programming. 32nd international colloquium, ICALP 2005, Lisbon, Portugal, July 11–15, 2005. Proceedings. Berlin: Springer (ISBN 3-540-27580-0/pbk). Lecture Notes in Computer Science 3580, 803-815 (2005).
MSC:  68P20 94A62
PDFBibTeX XMLCite
Full Text: DOI

Secure distributed human computation. (English) Zbl 1120.68346

Patrick, Andrew S. (ed.) et al., Financial cryptography and data security. 9th international conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 – March 3, 2005. Revised papers. Berlin: Springer (ISBN 3-540-26656-9/pbk). Lecture Notes in Computer Science 3570, 328-332 (2005).
MSC:  68M14 94A60
PDFBibTeX XMLCite
Full Text: DOI

QuasiModo: Efficient certificate validation and revocation. (English) Zbl 1198.94147

Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 375-388 (2004).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Eliminating random permutation oracles in the Even-Mansour cipher. (English) Zbl 1094.94030

Lee, Pil Joong, Advances in cryptology – ASIACRYPT 2004. 10th international conference on the theory and application of cryptology and information security, Jeju Island, Korea, December 5–9, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23975-8/pbk). Lecture Notes in Computer Science 3329, 32-47 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Aggregate and verifiably encrypted signatures from bilinear maps. (English) Zbl 1038.94553

Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 416-432 (2003).
MSC:  94A62 94A60 68P25
PDFBibTeX XMLCite
Full Text: Link

Certificate-based encryption and the certificate revocation problem. (English) Zbl 1037.68533

Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 272-293 (2003).
MSC:  68P25 94A62 94A60
PDFBibTeX XMLCite
Full Text: Link

Cryptanalysis of the revised NTRU signature scheme. (English) Zbl 1055.94015

Knudsen, Lars (ed.), Advances in cryptology - EUROCRYPT 2002. 21st international conference on the theory and applications of cryptographic techniques, Amsterdam, the Netherlands, April 28 – May 2, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43553-0). Lect. Notes Comput. Sci. 2332, 299-320 (2002).
MSC:  94A60 94A62 11H71
PDFBibTeX XMLCite
Full Text: Link

Hierarchical ID-based cryptography. (English) Zbl 1065.94547

Zheng, Yuliang (ed.), Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1–5, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00171-9). Lect. Notes Comput. Sci. 2501, 548-566 (2002).
MSC:  94A60 94A62 14G50
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the NTRU signature scheme (NSS) from EUROCRYPT 2001. (English) Zbl 1062.94547

Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 1-20 (2001).
MSC:  94A60 68P25 94A62
PDFBibTeX XMLCite
Full Text: Link

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software