×

Found 88 Documents (Results 1–88)

Secure multi-party computation using polarizing cards. (English) Zbl 1398.68145

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 281-297 (2015).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data. (English) Zbl 1398.68148

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 242-261 (2015).
MSC:  68P25 92D10 94A60
PDFBibTeX XMLCite
Full Text: DOI

New security proof for the Boneh-Boyen IBE: tight reduction in unbounded multi-challenge security. (English) Zbl 1366.94474

Hui, K. (ed.) et al., Information and communications security. 16th international conference, ICICS 2014, Hong Kong, China, December 16–17, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-21965-3/pbk; 978-3-319-21966-0/ebook). Lecture Notes in Computer Science 8958, 176-190 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs. (English) Zbl 1380.94070

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 575-601 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A framework for identity-based encryption with almost tight security. (English) Zbl 1380.94069

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 521-549 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An asymptotically optimal method for converting bit encryption to multi-bit encryption. (English) Zbl 1396.94090

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 415-442 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A signature scheme with a fuzzy private key. (English) Zbl 1348.94073

Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-28165-0/pbk; 978-3-319-28166-7/ebook). Lecture Notes in Computer Science 9092, 105-126 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption. (English) Zbl 1382.94149

Nyberg, Kaisa (ed.), Topics in cryptology – CT-RSA 2015. The cryptographer’s track at the RSA conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-16714-5/pbk; 978-3-319-16715-2/ebook). Lecture Notes in Computer Science 9048, 410-428 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Completeness of single-bit projection-KDM security for public key encryption. (English) Zbl 1332.94070

Nyberg, Kaisa (ed.), Topics in cryptology – CT-RSA 2015. The cryptographer’s track at the RSA conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-16714-5/pbk; 978-3-319-16715-2/ebook). Lecture Notes in Computer Science 9048, 201-219 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Black-box separations of hash-and-sign signatures in the non-programmable random oracle model. (English) Zbl 1338.94096

Au, Man-Ho (ed.) et al., Provable security. 9th international conference, ProvSec 2015, Kanazawa, Japan, November 24–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26058-7/pbk; 978-3-319-26059-4/ebook). Lecture Notes in Computer Science 9451, 435-454 (2015).
MSC:  94A62 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Multi-party computation with small shuffle complexity using regular polygon cards. (English) Zbl 1388.94078

Au, Man-Ho (ed.) et al., Provable security. 9th international conference, ProvSec 2015, Kanazawa, Japan, November 24–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26058-7/pbk; 978-3-319-26059-4/ebook). Lecture Notes in Computer Science 9451, 127-146 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Dynamic threshold public-key encryption with decryption consistency from static assumptions. (English) Zbl 1358.94077

Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 77-92 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient key dependent message security amplification against chosen ciphertext attacks. (English) Zbl 1355.94063

Lee, Jooyoung (ed.) et al., Information security and cryptology – ICISC 2014. 17th international conference, Seoul, Korea, December 3–5, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-15942-3/pbk; 978-3-319-15943-0/ebook). Lecture Notes in Computer Science 8949, 84-100 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms. (English) Zbl 1359.94616

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part I. Heidelberg: Springer (ISBN 978-3-662-46493-9/pbk). Lecture Notes in Computer Science 9014, 561-590 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A short fail-stop signature scheme from factoring. (English) Zbl 1368.94133

Chow, Sherman S.M. (ed.) et al., Provable security. 8th international conference, ProvSec 2014, Hong Kong, China, October 9–10, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12474-2/pbk). Lecture Notes in Computer Science 8782, 309-316 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Compact public key encryption with minimum ideal property of hash functions. (English) Zbl 1368.94137

Chow, Sherman S.M. (ed.) et al., Provable security. 8th international conference, ProvSec 2014, Hong Kong, China, October 9–10, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12474-2/pbk). Lecture Notes in Computer Science 8782, 178-193 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

More constructions of re-splittable threshold public key encryption. (English) Zbl 1417.94079

Yoshida, Maki (ed.) et al., Advances in information and computer security. 9th international workshop on security, IWSEC 2014, Hirosaki, Japan, August 27–29, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8639, 109-118 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Chosen ciphertext security on hard membership decision groups: the case of semi-smooth subgroups of quadratic residues. (English) Zbl 1378.94070

Abdalla, Michel (ed.) et al., Security and cryptography for networks. 9th international conference, SCN 2014, Amalfi, Italy, September 3–5, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-10878-0/pbk). Lecture Notes in Computer Science 8642, 558-577 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications. (English) Zbl 1334.94096

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 90-107 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A revocable group signature scheme from identity-based revocation techniques: achieving constant-size revocation list. (English) Zbl 1404.94037

Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 419-437 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

All-but-one dual projective hashing and its applications. (English) Zbl 1353.94079

Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 181-198 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

A framework and compact constructions for non-monotonic attribute-based encryption. (English) Zbl 1335.94084

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 275-292 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Chosen ciphertext security via UCE. (English) Zbl 1335.94068

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 56-76 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Chosen ciphertext security via point obfuscation. (English) Zbl 1317.94122

Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 95-120 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Achieving chosen ciphertext security from detectable public key encryption efficiently via hybrid encryption. (English) Zbl 1344.94063

Sakiyama, Kazuo (ed.) et al., Advances in information and computer security. 8th international workshop on security, IWSEC 2013, Okinawa, Japan, November 18–20, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41382-7/pbk). Lecture Notes in Computer Science 8231, 226-243 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Ciphertext policy multi-dimensional range encryption. (English) Zbl 1342.94073

Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 247-261 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Key encapsulation mechanisms from extractable hash proof systems, revisited. (English) Zbl 1314.94089

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 332-351 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Chosen ciphertext secure keyed-homomorphic public-key encryption. (English) Zbl 1314.94066

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 32-50 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Group signatures with message-dependent opening. (English) Zbl 1305.94092

Abdalla, Michel (ed.) et al., Pairing-based cryptography – Pairing 2012. 5th international conference, Cologne, Germany, May 16–18, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36333-7/pbk). Lecture Notes in Computer Science 7708, 270-294 (2013).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. (English) Zbl 1258.94004

Lecture Notes in Computer Science 7778. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). xiv, 518 p. (2013).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Advances in information and computer security. 7th international workshop on security, IWSEC 2012, Fukuoka, Japan, November 7–9, 2012. Proceedings. (English) Zbl 1259.68006

Lecture Notes in Computer Science 7631. Berlin: Springer (ISBN 978-3-642-34116-8/pbk). xii, 261 p. (2012).
PDFBibTeX XMLCite
Full Text: DOI

Time-specific encryption from forward-secure encryption. (English) Zbl 1310.94154

Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 184-204 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

On the impossibility of constructing efficient key encapsulation and programmable hash functions in prime order groups. (English) Zbl 1296.94120

Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 812-831 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the security of dynamic group signatures: preventing signature hijacking. (English) Zbl 1291.94196

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 715-732 (2012).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Solving a discrete logarithm problem with auxiliary input on a 160-bit elliptic curve. (English) Zbl 1270.11125

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 595-608 (2012).
MSC:  11T71 14G50 94A60
PDFBibTeX XMLCite
Full Text: DOI

Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms. (English) Zbl 1300.94083

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 576-594 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication. (English) Zbl 1290.94158

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 243-261 (2012).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Space efficient signature schemes from the RSA assumption. (English) Zbl 1252.94116

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 102-119 (2012).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Generic construction of chosen ciphertext secure proxy re-encryption. (English) Zbl 1292.94072

Dunkelman, Orr (ed.), Topics in cryptology – CT-RSA 2012. The cryptographers’ track at the RSA conference 2012, San Francisco, CA, USA, February 27–March 2, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27953-9/pbk). Lecture Notes in Computer Science 7178, 349-364 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Two-dimensional representation of cover free families and its applications: short signatures and more. (English) Zbl 1292.94155

Dunkelman, Orr (ed.), Topics in cryptology – CT-RSA 2012. The cryptographers’ track at the RSA conference 2012, San Francisco, CA, USA, February 27–March 2, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27953-9/pbk). Lecture Notes in Computer Science 7178, 260-277 (2012).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Towards restricting plaintext space in public key encryption. (English) Zbl 1344.94071

Iwata, Tetsu (ed.) et al., Advances in information and computer security. 6th international workshop, IWSEC 2011, Tokyo, Japan, November 8–10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25140-5/pbk). Lecture Notes in Computer Science 7038, 193-209 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Non-transferable user certification secure against authority information leaks and impersonation attacks. (English) Zbl 1428.94112

Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7–10, 2011. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6715, 413-430 (2011).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

On the security of a bidirectional proxy re-encryption scheme from PKC 2010. (English) Zbl 1291.94167

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 284-295 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Generic constructions for chosen-ciphertext secure attribute based encryption. (English) Zbl 1291.94170

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 71-89 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Toward an easy-to-understand structure for achieving chosen ciphertext security from the decisional Diffie-Hellman assumption. (English) Zbl 1286.94089

Heng, Swee-Huay (ed.) et al., Provable security. 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-16279-4/pbk). Lecture Notes in Computer Science 6402, 229-243 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient broadcast encryption with personalized messages. (English) Zbl 1286.94010

Heng, Swee-Huay (ed.) et al., Provable security. 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-16279-4/pbk). Lecture Notes in Computer Science 6402, 214-228 (2010).
MSC:  94A05 94A60
PDFBibTeX XMLCite
Full Text: DOI

An improvement of pseudorandomization against unbounded attack algorithms – the case of fingerprint codes. (English) Zbl 1285.94086

Kurosawa, Kaoru (ed.), Information theoretic security. 4th international conference, ICITS 2009, Shizuoka, Japan, December 3–6, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14495-0/pbk). Lecture Notes in Computer Science 5973, 213-230 (2010).
MSC:  94A60 65C10
PDFBibTeX XMLCite
Full Text: DOI

On the security of pseudorandomized information-theoretically secure schemes. (English) Zbl 1282.94061

Kurosawa, Kaoru (ed.), Information theoretic security. 4th international conference, ICITS 2009, Shizuoka, Japan, December 3–6, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14495-0/pbk). Lecture Notes in Computer Science 5973, 56-73 (2010).
PDFBibTeX XMLCite
Full Text: DOI

Generic constructions of parallel key-insulated encryption. (English) Zbl 1286.68112

Garay, Juan A. (ed.) et al., Security and cryptography for networks. 7th international conference, SCN 2010, Amalfi, Italy, September 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15316-7/pbk). Lecture Notes in Computer Science 6280, 36-53 (2010).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Improving efficiency of an ‘on the fly’ identification scheme by perfecting zero-knowledgeness. (English) Zbl 1274.94110

Pieprzyk, Josef (ed.), Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11924-8/pbk). Lecture Notes in Computer Science 5985, 284-301 (2010).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Unconditionally secure chaffing-and-winnowing for multiple use. (English) Zbl 1263.94029

Desmedt, Yvo (ed.), Information theoretic security. Second international conference, ICITS 2007, Madrid, Spain, May 25–29, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-642-10229-5/pbk). Lecture Notes in Computer Science 4883, 133-145 (2009).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

On the theoretical gap between group signatures with and without unlinkability. (English) Zbl 1246.94046

Preneel, Bart (ed.), Progress in cryptology – AFRICACRYPT 2009. Second international conference on cryptology in Africa, Gammarth, Tunisia, June 21–25, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02383-5/pbk). Lecture Notes in Computer Science 5580, 149-166 (2009).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

An efficient encapsulation scheme from near collision resistant pseudorandom generators and its application to IBE-to-PKE transformations. (English) Zbl 1237.94077

Fischlin, Marc (ed.), Topics in cryptology – CT-RSA 2009. The cryptographers’ track at the RSA conference 2009, San Francisco, CA, USA, April 20–24, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00861-0/pbk). Lecture Notes in Computer Science 5473, 16-31 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption. (English) Zbl 1206.94070

Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 308-325 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Orthogonality between key privacy and data privacy, revisited. (English) Zbl 1166.94346

Pei, Dingyi (ed.) et al., Information security and cryptology. Third SKLOIS conference, Inscrypt 2007, Xining, China, August 31–September 5, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-79498-1/pbk). Lecture Notes in Computer Science 4990, 313-327 (2008).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

A fuzzy ID-based encryption efficient when error rate is low. (English) Zbl 1203.94099

Roy Chowdhury, Dipanwita (ed.) et al., Progress in cryptology – INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89753-8/pbk). Lecture Notes in Computer Science 5365, 116-129 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Some information theoretic arguments for encryption: Non-malleability and chosen-ciphertext security (invited talk). (English) Zbl 1162.94325

Safavi-Naini, Reihaneh (ed.), Information theoretic security. Third international conference, ICITS 2008, Calgary, Canada, August 10–13, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85092-2/pbk). Lecture Notes in Computer Science 5155, 223-231 (2008).
MSC:  94A15 94A60
PDFBibTeX XMLCite
Full Text: DOI

Formal security treatments for signatures from identity-based encryption. (English) Zbl 1138.94379

Susilo, Willy (ed.) et al., Provable security. First international conference, ProvSec 2007, Wollongong, Australia, November 1–2, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75669-9/pbk). Lecture Notes in Computer Science 4784, 218-227 (2007).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

A CDH-based strongly unforgeable signature without collision resistant hash function. (English) Zbl 1138.94368

Susilo, Willy (ed.) et al., Provable security. First international conference, ProvSec 2007, Wollongong, Australia, November 1–2, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75669-9/pbk). Lecture Notes in Computer Science 4784, 68-84 (2007).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Bounded CCA2-secure encryption. (English) Zbl 1153.94363

Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 502-518 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Trade-off traitor tracing. (English) Zbl 1153.94419

Srinathan, K. (ed.) et al., Progress in cryptology – INDOCRYPT 2007. 8th international conference on cryptology in India, Chennai, India, December 9–13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77025-1/pbk). Lecture Notes in Computer Science 4859, 331-340 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Reducing the spread of damage of key exposures in key-insulated encryption. (English) Zbl 1295.94130

Nguyen, Phong Q. (ed.), Progress in cryptology – VIETCRYPT 2006. First international conference on cryptology in Vietnam, Hanoi, Vietnam, September 25–28, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-68799-3/pbk). Lecture Notes in Computer Science 4341, 366-384 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient identity-based encryption with tight security reduction. (English) Zbl 1307.94034

Pointcheval, David (ed.) et al., Cryptology and network security. 5th international conference, CANS 2006, Suzhou, China, December 8–10, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49462-1/pbk). Lecture Notes in Computer Science 4301, 19-36 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Relations among notions of security for identity based encryption schemes. (English) Zbl 1145.94431

Correa, José R. (ed.) et al., LATIN 2006: Theoretical informatics. 7th Latin American symposium, Valdivia, Chile, March 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-32755-X/pbk). Lecture Notes in Computer Science 3887, 130-141 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Adaptively secure traitor tracing against key exposure and its application to anywhere tv service. (English) Zbl 1176.94053

Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 123-135 (2006).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Generic transforms to acquire cca-security for identity based encryption: the cases of FO\(_{\text{pkc}}\) and react. (English) Zbl 1176.94047

Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 348-359 (2006).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Parallel key-insulated public key encryption. (English) Zbl 1151.94515

Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 105-122 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Applying Fujisaki-Okamoto to identity-based encryption. (English) Zbl 1125.94029

Fossorier, Marc (ed.) et al., Applied algebra, algebraic algorithms and error-correcting codes. 16th international symposium, AAECC-16, Las Vegas, NV, USA, February 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-31423-7/pbk). Lecture Notes in Computer Science 3857, 183-192 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Unconditionally secure chaffing-and-winnowing: a relationship between encryption and authentication. (English) Zbl 1125.94033

Fossorier, Marc (ed.) et al., Applied algebra, algebraic algorithms and error-correcting codes. 16th international symposium, AAECC-16, Las Vegas, NV, USA, February 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-31423-7/pbk). Lecture Notes in Computer Science 3857, 154-162 (2006).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Identity-based hierarchical strongly key-insulated encryption and its application. (English) Zbl 1154.94393

Roy, Bimal (ed.), Advances in cryptology – ASIACRYPT 2005. 11th international conference on the theory and application of cryptology and information security, Chennai, India, December 4–8, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30684-9/pbk). Lecture Notes in Computer Science 3788, 495-514 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the security of multiple encryption or CCA-security + CCA-security = CCA-security? (English) Zbl 1198.94140

Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 360-374 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Information theoretically secure oblivious polynomial evaluation: Model, bounds, and constructions. (English) Zbl 1098.94022

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 62-73 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the security of cryptosystems with all-or-nothing transform. (English) Zbl 1103.68548

Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 76-90 (2004).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Unconditionally non-interactive verifiable secret sharing secure against faulty majorities in the commodity based model. (English) Zbl 1103.68532

Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 355-368 (2004).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

The role of arbiters in asymmetric authentication schemes. (English) Zbl 1255.94075

Boyd, Colin (ed.) et al., Information security. 6th international conference, ISC 2003, Bristol, UK, October 1–3, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20176-9/pbk). Lect. Notes Comput. Sci. 2851, 428-441 (2003).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Unconditionally secure homomorphic pre-distributed bit commitment and secure two-party computations. (English) Zbl 1255.94063

Boyd, Colin (ed.) et al., Information security. 6th international conference, ISC 2003, Bristol, UK, October 1–3, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20176-9/pbk). Lect. Notes Comput. Sci. 2851, 151-164 (2003).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI

Separating encryption and key issuance in digital rights management systems. (English) Zbl 1042.68570

Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9–11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 365-376 (2003).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: Link

Security notions for unconditionally secure signature schemes. (English) Zbl 1056.94523

Knudsen, Lars (ed.), Advances in cryptology - EUROCRYPT 2002. 21st international conference on the theory and applications of cryptographic techniques, Amsterdam, the Netherlands, April 28 – May 2, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43553-0). Lect. Notes Comput. Sci. 2332, 434-449 (2002).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: Link

Efficient and unconditionally secure digital signatures and a security analysis of a multireceiver authentication code. (English) Zbl 1055.94535

Naccache, David (ed.) et al., Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12–14, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43168-3). Lect. Notes Comput. Sci. 2274, 64-79 (2002).
MSC:  94A62 68Q25
PDFBibTeX XMLCite
Full Text: Link

Unconditionally secure key insulated cryptosystems: Models, bounds and constructions. (English) Zbl 1023.68553

Deng, Robert (ed.) et al., Information and communications security. 4th international conference, ICICS 2002, Singapore, December 9-12, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2513, 85-96 (2002).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: Link

Unconditionally secure anonymous encryption and group authentication. (English) Zbl 1065.94550

Zheng, Yuliang (ed.), Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1–5, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00171-9). Lect. Notes Comput. Sci. 2501, 81-99 (2002).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Efficient asymmetric self-enforcement scheme with public traceability. (English) Zbl 0996.94521

Kim, Kwangjo (ed.), Public key cryptography. 4th international workshop on practice and theory in public key cryptosystems, PKC 2001. Cheju Island, Korea, February 13-15, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1992, 225-239 (2001).
MSC:  94A60
PDFBibTeX XMLCite

Unconditionally secure digital signature schemes admitting transferability. (English) Zbl 0980.94025

Okamoto, Tatsuaki (ed.), Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1976, 130-142 (2000).
MSC:  94A62 94A60
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

Software