×

Found 117 Documents (Results 1–100)

The hidden graph model: communication locality and optimal resiliency with adaptive faults. (English) Zbl 1365.68255

Proceedings of the 6th conference on innovations in theoretical computer science, ITCS’15, Rehovot, Israel, January 11–13, 2015. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-3333-7). 153-162 (2015).
MSC:  68Q05 68M12 68Q10 68R10 94A60
PDFBibTeX XMLCite
Full Text: DOI

Communication-optimal proactive secret sharing for dynamic groups. (English) Zbl 1459.94157

Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 23-41 (2015).
MSC:  94A62 68Q10
PDFBibTeX XMLCite
Full Text: DOI

Incoercible multi-party computation and universally composable receipt-free voting. (English) Zbl 1352.94024

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 763-780 (2015).
MSC:  94A60 68P25 68M12
PDFBibTeX XMLCite
Full Text: DOI

Round-optimal black-box two-party computation. (English) Zbl 1352.94056

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 339-358 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptography with one-way communication. (English) Zbl 1351.94046

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 191-208 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Impossibility of black-box simulation against leakage attacks. (English) Zbl 1336.94068

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 130-149 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Executable proofs, input-size hiding secure computation and a new ideal world. (English) Zbl 1403.94047

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 532-560 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Garbled RAM from one-way functions. (English) Zbl 1321.94061

Proceedings of the 47th annual ACM symposium on theory of computing, STOC ’15, Portland, OR, USA, June 14–17, 2015. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-3536-2). 449-458 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Non-committing encryption from \(\Phi\)-hiding. (English) Zbl 1359.94605

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part I. Heidelberg: Springer (ISBN 978-3-662-46493-9/pbk). Lecture Notes in Computer Science 9014, 591-608 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Resettably sound zero-knowledge arguments from OWFs – the (semi) black-box way. (English) Zbl 1354.94042

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part I. Heidelberg: Springer (ISBN 978-3-662-46493-9/pbk). Lecture Notes in Computer Science 9014, 345-374 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Broadcast (and round) efficient verifiable secret sharing. (English) Zbl 1395.94323

Padró, Carles (ed.), Information theoretic security. 7th international conference, ICITS 2013, Singapore, November 28–30, 2013. Proceedings. Cham: Springer (ISBN 978-3-319-04267-1/pbk; 978-3-319-04268-8/ebook). Lecture Notes in Computer Science 8317, 200-219 (2014).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Fast and unconditionally secure anonymous channel. (English) Zbl 1321.94059

Proceedings of the 2014 ACM symposium on principles of distributed computing, PODC ’14, Paris, France, July 15–18, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2944-6). 313-321 (2014).
PDFBibTeX XMLCite
Full Text: DOI

How to withstand mobile virus attacks, revisited. (English) Zbl 1321.94036

Proceedings of the 2014 ACM symposium on principles of distributed computing, PODC ’14, Paris, France, July 15–18, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2944-6). 293-302 (2014).
PDFBibTeX XMLCite
Full Text: DOI

Black-box non-black-box zero knowledge. (English) Zbl 1315.94077

Proceedings of the 46th annual ACM symposium on theory of computing, STOC ’14, New York, NY, USA, May 31 – June 3, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2710-7). 515-524 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On selective-opening attacks against encryption schemes. (English) Zbl 1378.94060

Abdalla, Michel (ed.) et al., Security and cryptography for networks. 9th international conference, SCN 2014, Amalfi, Italy, September 3–5, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-10878-0/pbk). Lecture Notes in Computer Science 8642, 578-597 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Communication-efficient MPC for general adversary structures. (English) Zbl 1423.68184

Abdalla, Michel (ed.) et al., Security and cryptography for networks. 9th international conference, SCN 2014, Amalfi, Italy, September 3–5, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8642, 155-174 (2014).
PDFBibTeX XMLCite
Full Text: DOI

Secure multi-party computation with identifiable abort. (English) Zbl 1335.94053

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 369-386 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Maliciously circuit-private FHE. (English) Zbl 1343.94075

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 536-553 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On input indistinguishable proof systems. (English) Zbl 1412.68066

Esparza, Javier (ed.) et al., Automata, languages, and programming. 41st international colloquium, ICALP 2014, Copenhagen, Denmark, July 8–11, 2014. Proceedings, Part I. Berlin: Springer. Lect. Notes Comput. Sci. 8572, 895-906 (2014).
MSC:  68Q10 94A60
PDFBibTeX XMLCite
Full Text: DOI

Garbled RAM revisited. (English) Zbl 1332.94067

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 405-422 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Cross-domain secure computation. (English) Zbl 1335.94038

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 650-668 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Achieving privacy in verifiable computation with multiple servers – without FHE and without pre-processing. (English) Zbl 1335.94026

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 149-166 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

4-round resettably-sound zero knowledge. (English) Zbl 1323.94107

Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 192-216 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Statistical concurrent non-malleable zero knowledge. (English) Zbl 1323.94132

Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 167-191 (2014).
MSC:  94A60 68P25 68Q15
PDFBibTeX XMLCite
Full Text: DOI

Constant-round concurrent zero knowledge in the bounded player model. (English) Zbl 1300.94057

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 21-40 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Building lossy trapdoor functions from lossy encryption. (English) Zbl 1326.94099

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 241-260 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Optimal coding for streaming authentication and interactive communication. (English) Zbl 1316.94073

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 258-276 (2013).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Robust pseudorandom generators. (English) Zbl 1336.94053

Fomin, Fedor V. (ed.) et al., Automata, languages, and programming. 40th international colloquium, ICALP 2013, Riga, Latvia, July 8–12, 2013, Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-39205-4/pbk). Lecture Notes in Computer Science 7965, 576-588 (2013).
MSC:  94A60 68Q25 94A55 94C10
PDFBibTeX XMLCite
Full Text: DOI

On linear-size pseudorandom generators and hardcore functions. (English) Zbl 1381.94061

Du, Ding-Zhu (ed.) et al., Computing and combinatorics. 19th international conference, COCOON 2013, Hangzhou, China, June 21–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38767-8/pbk). Lecture Notes in Computer Science 7936, 169-181 (2013).
MSC:  94A60 11K45 68Q17
PDFBibTeX XMLCite
Full Text: DOI

How to garble RAM programs? (English) Zbl 1300.68027

Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 719-734 (2013).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Universally composable secure computation with (malicious) physically uncloneable functions. (English) Zbl 1300.68029

Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 702-718 (2013).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptography using CAPTCHA puzzles. (English) Zbl 1314.94080

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 89-106 (2013).
MSC:  94A60 68T20
PDFBibTeX XMLCite
Full Text: DOI

Revisiting lower and upper bounds for selective decommitments. (English) Zbl 1315.94097

Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 559-578 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Distributed oblivious RAM for secure two-party computation. (English) Zbl 1315.94088

Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 377-396 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Succinct non-interactive arguments via linear interactive proofs. (English) Zbl 1316.68056

Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 315-333 (2013).
MSC:  68Q25 68Q15 94A60
PDFBibTeX XMLCite
Full Text: DOI

Concurrent zero knowledge in the bounded player model. (English) Zbl 1297.94073

Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 60-79 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Nearly simultaneously resettable black-box zero knowledge. (English) Zbl 1272.94014

Czumaj, Artur (ed.) et al., Automata, languages, and programming. 39th international colloquium, ICALP 2012, Warwick, UK, July 9–13, 2012. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-31593-0/pbk). Lecture Notes in Computer Science 7391, 88-99 (2012).
MSC:  94A60 68Q25
PDFBibTeX XMLCite
Full Text: DOI

Multiparty proximity testing with dishonest majority from equality testing. (English) Zbl 1367.68017

Czumaj, Artur (ed.) et al., Automata, languages, and programming. 39th international colloquium, ICALP 2012, Coventry, UK, July 9–13, 2012. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-31584-8/pbk). Lecture Notes in Computer Science 7392, 537-548 (2012).
MSC:  68M12 94A60
PDFBibTeX XMLCite
Full Text: DOI

Near-linear unconditionally-secure multiparty computation with a dishonest minority. (English) Zbl 1296.94082

Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 663-680 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Impossibility results for static input secure computation. (English) Zbl 1296.94114

Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 424-442 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Extended-DDH and lossy trapdoor functions. (English) Zbl 1291.94096

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 627-643 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Correlated product security from any one-way function. (English) Zbl 1300.94058

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 558-575 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On homomorphic encryption and chosen-ciphertext security. (English) Zbl 1252.94071

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 52-65 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Unconditionally-secure robust secret sharing with compact shares. (English) Zbl 1297.94116

Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 195-208 (2012).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Simultaneously resettable arguments of knowledge. (English) Zbl 1296.94101

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 530-547 (2012).
MSC:  94A60 68P25 68Q15
PDFBibTeX XMLCite
Full Text: DOI

Resettable statistical zero knowledge. (English) Zbl 1296.94115

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 494-511 (2012).
MSC:  94A60 68M12 68Q15
PDFBibTeX XMLCite
Full Text: DOI

Identifying cheaters without an honest majority. (English) Zbl 1303.94083

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 21-38 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security. (English) Zbl 1227.94048

Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 70-88 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Public key locally decodable codes with short keys. (English) Zbl 1343.94102

Goldberg, Leslie Ann (ed.) et al., Approximation, randomization, and combinatorial optimization. Algorithms and techniques. 14th international workshop, APPROX 2011, and 15th international workshop, RANDOM 2011, Princeton, NJ, USA, August 17–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22934-3/pbk). Lecture Notes in Computer Science 6845, 605-615 (2011).
MSC:  94B35 94A60
PDFBibTeX XMLCite
Full Text: DOI

Constant-rate oblivious transfer from noisy channels. (English) Zbl 1290.94092

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 667-684 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Position-based quantum cryptography: impossibility and constructions. (English) Zbl 1287.94060

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 429-446 (2011).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Secure message transmission by public discussion: a brief survey. (English) Zbl 1272.94003

Chee, Yeow Meng (ed.) et al., Coding and cryptology. Third international workshop, IWCC 2011, Qingdao, China, May 30 – June 3, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20900-0/pbk). Lecture Notes in Computer Science 6639, 126-141 (2011).
MSC:  94A05 68M12 94A40
PDFBibTeX XMLCite
Full Text: DOI

Efficient non-interactive secure computation. (English) Zbl 1290.94151

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 406-425 (2011).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Privacy amplification with asymptotically optimal entropy loss. (English) Zbl 1293.94101

Proceedings of the 42nd annual ACM symposium on theory of computing, STOC ’10. Cambridge, MA, USA, June 5–8, 2010. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-817-9). 785-794 (2010).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Public-key encryption with efficient amortized updates. (English) Zbl 1291.68162

Garay, Juan A. (ed.) et al., Security and cryptography for networks. 7th international conference, SCN 2010, Amalfi, Italy, September 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15316-7/pbk). Lecture Notes in Computer Science 6280, 17-35 (2010).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Equivalence of uniform key agreement and composition insecurity. (English) Zbl 1283.94059

Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 447-464 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Password-authenticated session-key generation on the internet in the plain model. (English) Zbl 1280.94109

Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 277-294 (2010).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Secure message transmission with small public discussion. (English) Zbl 1280.94057

Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 177-196 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficiency preserving transformations for concurrent non-malleable zero knowledge. (English) Zbl 1274.94102

Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 535-552 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On complete primitives for fairness. (English) Zbl 1274.94071

Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 91-108 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Extracting correlations. (English) Zbl 1292.94080

2009 IEEE 50th annual symposium on foundations of computer science – FOCS 2009. Proceedings of the symposium, Atlanta, GA, USA, October 24–27, 2009. Los Alamitos, CA: IEEE Computer Society (ISBN 978-0-7695-3850-1; 978-1-4244-5116-6/ebook). 261-270 (2009).
MSC:  94A60 68Q87 68M12
PDFBibTeX XMLCite
Full Text: DOI

Position based cryptography. (English) Zbl 1252.94053

Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 391-407 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Authenticated adversarial routing. (English) Zbl 1213.68073

Reingold, Omer (ed.), Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00456-8/pbk). Lecture Notes in Computer Science 5444, 163-182 (2009).
PDFBibTeX XMLCite
Full Text: DOI

Simulation-based concurrent non-malleable commitments and decommitments. (English) Zbl 1213.94125

Reingold, Omer (ed.), Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00456-8/pbk). Lecture Notes in Computer Science 5444, 91-108 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Communication complexity in algebraic two-party protocols. (English) Zbl 1183.94043

Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 379-396 (2008).
MSC:  94A60 68P20 68Q25
PDFBibTeX XMLCite
Full Text: DOI

Public-key locally-decodable codes. (English) Zbl 1183.94036

Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 126-143 (2008).
MSC:  94A60 68P20 94B35
PDFBibTeX XMLCite
Full Text: DOI

Circular-secure encryption from decision Diffie-Hellman. (English) Zbl 1183.94025

Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 108-125 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptography with constant computational overhead. (English) Zbl 1231.94050

STOC’08. Proceedings of the 40th annual ACM symposium on theory of computing 2008, Victoria, Canada, May 17–20, 2008. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-047-0). 433-442 (2008).
MSC:  94A60 68P25
PDFBibTeX XMLCite

Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10–12, 2008. Proceedings. (English) Zbl 1148.68006

Lecture Notes in Computer Science 5229. Berlin: Springer (ISBN 978-3-540-85854-6/pbk). xi, 423 p. (2008).
PDFBibTeX XMLCite
Full Text: DOI

Constant-round concurrent non-malleable zero knowledge in the bare public-key model. (English) Zbl 1155.94379

Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 548-559 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Visual cryptography on graphs. (English) Zbl 1148.94435

Hu, Xiaodong (ed.) et al., Computing and combinatorics. 14th annual international conference, COCOON 2008, Dalian, China, June 27–29, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69732-9/pbk). Lecture Notes in Computer Science 5092, 225-234 (2008).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Almost-everywhere secure computation. (English) Zbl 1149.68377

Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 307-323 (2008).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptography in the multi-string model. (English) Zbl 1215.94048

Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 323-341 (2007).
PDFBibTeX XMLCite
Full Text: DOI

Public key encryption that allows PIR queries. (English) Zbl 1215.68096

Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 50-67 (2007).
PDFBibTeX XMLCite
Full Text: DOI

Zero-knowledge from secure multiparty computation. (English) Zbl 1232.68044

STOC’07. Proceedings of the 39th annual ACM symposium on theory of computing, San Diego, CA, USA, June 11–13, 2007. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-59593-631-8). 21-30 (2007).
PDFBibTeX XMLCite

Concurrent statistical zero-knowledge arguments for NP from one way functions. (English) Zbl 1153.94384

Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 444-459 (2007).
MSC:  94A60 68Q15
PDFBibTeX XMLCite
Full Text: DOI

Private locally decodable codes. (English) Zbl 1171.94375

Arge, Lars (ed.) et al., Automata, languages and programming. 34th international colloquium, ICALP 2007, Wrocław, Poland, July 9–13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73419-2/pbk). Lecture Notes in Computer Science 4596, 387-398 (2007).
MSC:  94B35 94A62
PDFBibTeX XMLCite
Full Text: DOI

A survey of single-database private information retrieval: techniques and applications. (English) Zbl 1161.68435

Okamoto, Tatsuaki (ed.) et al., Public key cryptography – PKC 2007. 10th international conference on practice and theory in public-key cryptography, Beijing, China, April 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-71676-1/pbk). Lecture Notes in Computer Science 4450, 393-411 (2007).
MSC:  68P20 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Sequential aggregate signatures and multisignatures without random oracles. (English) Zbl 1140.94358

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 465-485 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Perfect non-interactive zero knowledge for NP. (English) Zbl 1129.94025

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 339-358 (2006).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Non-interactive ZAPs and new techniques for NIZK. (English) Zbl 1129.94024

Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 97-111 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure remote authentication using biometric data. (English) Zbl 1137.94365

Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 147-163 (2005).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Private searching on streaming data. (English) Zbl 1145.94472

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 223-240 (2005).
PDFBibTeX XMLCite
Full Text: DOI

Identity-based zero-knowledge. (English) Zbl 1116.94323

Blundo, Carlo (ed.) et al., Security in communication networks. 4th international conference, SCN 2004, Amalfi, Italy, September 8–10, 2004. Revised selected papers. Berlin: Springer (ISBN 3-540-24301-1/pbk). Lecture Notes in Computer Science 3352, 180-192 (2005).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

Software