×

Found 118 Documents (Results 1–100)

How fair is your protocol? A utility-based approach to protocol optimality. (English) Zbl 1333.94035

Proceedings of the 2015 ACM symposium on principles of distributed computing, PODC ’15, Donostia-San Sebastián, Spain, July 21–23, 2015. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-3617-8). 281-290 (2015).
MSC:  94A60 68M14 68W15
PDFBibTeX XMLCite
Full Text: DOI

Hash functions from defective ideal ciphers. (English) Zbl 1382.94127

Nyberg, Kaisa (ed.), Topics in cryptology – CT-RSA 2015. The cryptographer’s track at the RSA conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-16714-5/pbk; 978-3-319-16715-2/ebook). Lecture Notes in Computer Science 9048, 273-290 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. (English) Zbl 1318.94002

Lecture Notes in Computer Science 9020. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). xiv, 824 p. (2015).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Adaptively secure, universally composable, multiparty computation in constant rounds. (English) Zbl 1382.94086

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 586-613 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Multi-client verifiable computation with stronger security guarantees. (English) Zbl 1379.94039

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 144-168 (2015).
MSC:  94A60 68Q10 68P25
PDFBibTeX XMLCite
Full Text: DOI

Distributing the setup in universally composable multi-party computation. (English) Zbl 1321.68049

Proceedings of the 2014 ACM symposium on principles of distributed computing, PODC ’14, Paris, France, July 15–18, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2944-6). 20-29 (2014).
PDFBibTeX XMLCite
Full Text: DOI

Efficient three-party computation from cut-and-choose. (English) Zbl 1335.94039

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 513-530 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Amortizing garbled circuits. (English) Zbl 1335.94052

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 458-475 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Feasibility and infeasibility of secure computation with malicious PUFs. (English) Zbl 1335.94043

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 405-420 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Multi-input functional encryption. (English) Zbl 1327.94048

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 578-602 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Authenticated data structures, generically. (English) Zbl 1284.68215

Proceedings of the 41st ACM SIGPLAN-SIGACT symposium on principles of programming languages, POPL ’14, San Diego, CA, USA, January 22–24, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2544-8). 411-423 (2014).
PDFBibTeX XMLCite
Full Text: DOI

Verifiable oblivious storage. (English) Zbl 1335.94027

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 131-148 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

(Efficient) universally composable oblivious transfer using a minimal number of stateless tokens. (English) Zbl 1326.94081

Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 638-662 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Functional encryption from (small) hardware tokens. (English) Zbl 1315.68119

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 120-139 (2013).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient secure two-party computation using symmetric cut-and-choose. (English) Zbl 1316.94078

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 18-35 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient, adaptively secure, and composable oblivious transfer with a single, global CRS. (English) Zbl 1314.94061

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 73-88 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Feasibility and infeasibility of adaptively secure fully homomorphic encryption. (English) Zbl 1314.94077

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 14-31 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Multi-client non-interactive verifiable computation. (English) Zbl 1316.68053

Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 499-518 (2013).
MSC:  68Q10 68P25 94A62
PDFBibTeX XMLCite
Full Text: DOI

Universally composable synchronous computation. (English) Zbl 1316.68051

Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 477-498 (2013).
MSC:  68P25 68M12 94A60
PDFBibTeX XMLCite
Full Text: DOI

Feasibility and completeness of cryptographic tasks in the quantum world. (English) Zbl 1315.94070

Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 281-296 (2013).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Byzantine agreement with a rational adversary. (English) Zbl 1367.68019

Czumaj, Artur (ed.) et al., Automata, languages, and programming. 39th international colloquium, ICALP 2012, Coventry, UK, July 9–13, 2012. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-31584-8/pbk). Lecture Notes in Computer Science 7392, 561-572 (2012).
MSC:  68M12 94A60
PDFBibTeX XMLCite
Full Text: DOI

Collusion-preserving computation. (English) Zbl 1294.94090

Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 124-143 (2012).
PDFBibTeX XMLCite
Full Text: DOI

Constant-round multi-party private set union using reversed Laurent series. (English) Zbl 1300.94092

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 398-412 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fair computation with rational players. (English) Zbl 1290.94150

Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 81-98 (2012).
MSC:  94A62 68M12 91A80
PDFBibTeX XMLCite
Full Text: DOI

On the security of the “Free-XOR” technique. (English) Zbl 1303.94075

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 39-53 (2012).
MSC:  94A60 94C10
PDFBibTeX XMLCite
Full Text: DOI

Secure multi-party computation of Boolean circuits with applications to privacy in on-line marketplaces. (English) Zbl 1292.94047

Dunkelman, Orr (ed.), Topics in cryptology – CT-RSA 2012. The cryptographers’ track at the RSA conference 2012, San Francisco, CA, USA, February 27–March 2, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27953-9/pbk). Lecture Notes in Computer Science 7178, 416-432 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Adaptively secure broadcast, revisited. (English) Zbl 1321.94060

Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on principles of distributed computing, PODC ’11, San Jose, CA, USA, June 06–08, 2011. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-0719-2). 179-186 (2011).
PDFBibTeX XMLCite
Full Text: DOI

Constant-round private function evaluation with linear complexity. (English) Zbl 1227.94050

Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 556-571 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Impossibility of blind signatures from one-way permutations. (English) Zbl 1290.94152

Ishai, Yuval (ed.), Theory of cryptography. 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28–30, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19570-9/pbk). Lecture Notes in Computer Science 6597, 615-629 (2011).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Limits on the power of zero-knowledge proofs in cryptographic constructions. (English) Zbl 1290.94049

Ishai, Yuval (ed.), Theory of cryptography. 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28–30, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19570-9/pbk). Lecture Notes in Computer Science 6597, 559-578 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Limits of computational differential privacy in the client/server setting. (English) Zbl 1295.94077

Ishai, Yuval (ed.), Theory of cryptography. 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28–30, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19570-9/pbk). Lecture Notes in Computer Science 6597, 417-431 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Round-optimal password-based authenticated key exchange. (English) Zbl 1295.94089

Ishai, Yuval (ed.), Theory of cryptography. 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28–30, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19570-9/pbk). Lecture Notes in Computer Science 6597, 293-310 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A group signature scheme from lattice assumptions. (English) Zbl 1253.94071

Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 395-412 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Partial fairness in secure two-party computation. (English) Zbl 1279.94078

Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 157-176 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure network coding over the integers. (English) Zbl 1279.94075

Nguyen, Phong Q. (ed.) et al., Public key cryptography – PKC 2010. 13th international conference on practice and theory in public key cryptography, Paris, France, May 26–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13012-0/pbk). Lecture Notes in Computer Science 6056, 142-160 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient rational secret sharing in standard communication networks. (English) Zbl 1274.94137

Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 419-436 (2010).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: DOI

Signature schemes with bounded leakage resilience. (English) Zbl 1267.94072

Matsui, Mitsuru (ed.), Advances in cryptology – ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6–10, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10365-0/pbk). Lecture Notes in Computer Science 5912, 703-720 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Smooth projective hashing and password-based authenticated key exchange from lattices. (English) Zbl 1267.94122

Matsui, Mitsuru (ed.), Advances in cryptology – ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6–10, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10365-0/pbk). Lecture Notes in Computer Science 5912, 636-652 (2009).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Proofs of storage from homomorphic identification protocols. (English) Zbl 1267.94033

Matsui, Mitsuru (ed.), Advances in cryptology – ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6–10, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10365-0/pbk). Lecture Notes in Computer Science 5912, 319-333 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

On black-box constructions of predicate encryption from trapdoor permutations. (English) Zbl 1267.94073

Matsui, Mitsuru (ed.), Advances in cryptology – ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6–10, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10365-0/pbk). Lecture Notes in Computer Science 5912, 197-213 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Collusion-free multiparty computation in the mediated model. (English) Zbl 1252.94042

Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 524-540 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Signing a linear subspace: Signature schemes for network coding. (English) Zbl 1227.68024

Jarecki, Stanisław (ed.) et al., Public key cryptography – PKC 2009. 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00467-4/pbk). Lecture Notes in Computer Science 5443, 68-87 (2009).
MSC:  68P25 94A62
PDFBibTeX XMLCite
Full Text: DOI

Composability and on-line deniability of authentication. (English) Zbl 1213.94155

Reingold, Omer (ed.), Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00456-8/pbk). Lecture Notes in Computer Science 5444, 146-162 (2009).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Complete fairness in multi-party computation without an honest majority. (English) Zbl 1213.94104

Reingold, Omer (ed.), Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00456-8/pbk). Lecture Notes in Computer Science 5444, 19-35 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Complete fairness in secure two-party computation. (English) Zbl 1231.94062

STOC’08. Proceedings of the 40th annual ACM symposium on theory of computing 2008, Victoria, Canada, May 17–20, 2008. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-047-0). 413-422 (2008).
MSC:  94A60 68M12 68P25
PDFBibTeX XMLCite

How to encrypt with a malicious random number generator. (English) Zbl 1154.68397

Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 303-315 (2008).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Improving the round complexity of VSS in point-to-point networks. (English) Zbl 1155.68319

Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 499-510 (2008).
MSC:  68M12 68P25 94A62
PDFBibTeX XMLCite
Full Text: DOI

Aggregate message authentication codes. (English) Zbl 1153.94398

Malkin, Tal (ed.), Topics in cryptology – CT-RSA 2008. The cryptographers’ track at the RSA conference 2008, San Francisco, CA, USA, April 8–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-79262-8/pbk). Lecture Notes in Computer Science 4964, 155-169 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Predicate encryption supporting disjunctions, polynomial equations, and inner products. (English) Zbl 1149.94323

Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 146-162 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Universally composable multi-party computation with an unreliable common reference string. (English) Zbl 1162.94361

Canetti, Ran (ed.), Theory of cryptography. Fifth theory of cryptography conference, TCC 2008, New York, USA, March 19–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78524-8/pbk). Lecture Notes in Computer Science 4948, 142-154 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Universally-composable two-party computation in two rounds. (English) Zbl 1215.94052

Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 111-129 (2007).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

On achieving the “best of both worlds” in secure multiparty computation. (English) Zbl 1232.68045

STOC’07. Proceedings of the 39th annual ACM symposium on theory of computing, San Diego, CA, USA, June 11–13, 2007. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-59593-631-8). 11-20 (2007).
MSC:  68P25 94A60 68M12
PDFBibTeX XMLCite

Efficient cryptographic protocols based on the hardness of learning parity with noise. (English) Zbl 1154.94403

Galbraith, Steven D. (ed.), Cryptography and coding. 11th IMA international conference, Cirencester, UK, December 18–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77271-2/pbk). Lecture Notes in Computer Science 4887, 1-15 (2007).
MSC:  94A60 94A62 94B35
PDFBibTeX XMLCite
Full Text: DOI

Round-efficient secure computation in point-to-point networks. (English) Zbl 1141.94361

Naor, Moni (ed.), Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). Lecture Notes in Computer Science 4515, 311-328 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Universally composable multi-party computation using tamper-proof hardware. (English) Zbl 1141.94360

Naor, Moni (ed.), Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). Lecture Notes in Computer Science 4515, 115-128 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Applied cryptography and network security. 5th international conference, ACNS 2007, Zhuhai, China, June 5–8, 2007. Proceedings. (English) Zbl 1121.94002

Lecture Notes in Computer Science 4521. Berlin: Springer (ISBN 978-3-540-72737-8/pbk). xiii, 498 p. (2007).
PDFBibTeX XMLCite
Full Text: DOI

Concurrently-secure blind signatures without random oracles or setup assumptions. (English) Zbl 1129.94044

Vadhan, Salil P. (ed.), Theory of cryptography. 4th theory of cryptography conference, TCC 2007, Amsterdam, The Netherlands, February 21–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-70935-0/pbk). Lecture Notes in Computer Science 4392, 323-341 (2007).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Rational secret sharing, revisited. (English) Zbl 1152.94450

De Prisco, Roberto (ed.) et al., Security and cryptography for networks. 5th international conference, SCN 2006, Maiori, Italy, September 6–8, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38080-1/pbk). Lecture Notes in Computer Science 4116, 229-241 (2006).
MSC:  94A62 91A80
PDFBibTeX XMLCite
Full Text: DOI

Parallel and concurrent security of the HB and HB\({}^{+}\) protocols. (English) Zbl 1140.94352

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 73-87 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Robust fuzzy extractors and authenticated key agreement from close secrets. (English) Zbl 1161.94440

Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 232-250 (2006).
MSC:  94A62 68P20
PDFBibTeX XMLCite
Full Text: DOI

On expected constant-round protocols for Byzantine agreement. (English) Zbl 1161.68322

Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 445-462 (2006).
MSC:  68M12 94A60
PDFBibTeX XMLCite
Full Text: DOI

Ring signatures: stronger definitions, and constructions without random oracles. (English) Zbl 1112.94005

Halevi, Shai (ed.) et al., Theory of cryptography. Third theory of cryptography conference, TCC 2006, New York, NY, USA, March 4–7, 2006. Proceedings. Berlin: Springer (ISBN 3-540-32731-2/pbk). Lecture Notes in Computer Science 3876, 60-79 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Universally composable password-based key exchange. (English) Zbl 1137.94367

Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 404-421 (2005).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure remote authentication using biometric data. (English) Zbl 1137.94365

Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 147-163 (2005).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Reducing complexity assumptions for statistically-hiding commitment. (English) Zbl 1137.94345

Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 58-77 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Two-server password-only authenticated key exchange. (English) Zbl 1126.68402

Ioannidis, John (ed.) et al., Applied cryptography and network security. Third international conference, ACNS 2005, New York, NY, USA, June 7–10, 2005. Proceedings. Berlin: Springer (ISBN 3-540-26223-7/pbk). Lecture Notes in Computer Science 3531, 1-16 (2005).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Identity-based zero-knowledge. (English) Zbl 1116.94323

Blundo, Carlo (ed.) et al., Security in communication networks. 4th international conference, SCN 2004, Amalfi, Italy, September 8–10, 2004. Revised selected papers. Berlin: Springer (ISBN 3-540-24301-1/pbk). Lecture Notes in Computer Science 3352, 180-192 (2005).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Bounds on the efficiency of “black-box” commitment schemes. (English) Zbl 1081.94028

Caires, Luís (ed.) et al., Automata, languages and programming. 32nd international colloquium, ICALP 2005, Lisbon, Portugal, July 11–15, 2005. Proceedings. Berlin: Springer (ISBN 3-540-27580-0/pbk). Lecture Notes in Computer Science 3580, 128-139 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. (English) Zbl 1079.94535

Menezes, Alfred (ed.), Topics in cryptology – CT-RSA 2005. The cryptographers’ track at the RSA conference 2005, San Francisco, CA, USA, February 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24399-2/pbk). Lecture Notes in Computer Science 3376, 87-103 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Adaptively-secure, non-interactive public-key encryption. (English) Zbl 1079.94537

Kilian, Joe (ed.), Theory of cryptography. Second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24573-1/pbk). Lecture Notes in Computer Science 3378, 150-168 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Handling expected polynomial-time strategies in simulation-based security proofs. (English) Zbl 1079.94555

Kilian, Joe (ed.), Theory of cryptography. Second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24573-1/pbk). Lecture Notes in Computer Science 3378, 128-149 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Chosen-ciphertext security of multiple encryption. (English) Zbl 1079.94545

Kilian, Joe (ed.), Theory of cryptography. Second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24573-1/pbk). Lecture Notes in Computer Science 3378, 188-209 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A generic construction for intrusion-resilient public-key encryption. (English) Zbl 1196.94048

Okamoto, Tatsuaki (ed.), Topics in cryptology – CT-RSA 2004. The cryptographers’ track at the RSA conference 2004, San Francisco, CA, USA, February 23–27, 2004. Proceedings. Berlin: Springer (ISBN 3-540-20996-4/pbk). Lecture Notes in Computer Science 2964, 81-98 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Chosen-ciphertext security from identity-based encryption. (English) Zbl 1122.94358

Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 207-222 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Round-optimal secure two-party computation. (English) Zbl 1104.94027

Franklin, Matt (ed.), Advances in cryptology – CRYPTO 2004. 24th annual international cryptology conference, Santa Barbara, California, USA, August 15–19, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22668-0/pbk). Lecture Notes in Computer Science 3152, 335-354 (2004).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software