×

Found 100 Documents (Results 1–100)

Multi-party key exchange for unbounded parties from indistinguishability obfuscation. (English) Zbl 1337.94044

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 52-75 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Multi-input functional encryption for unbounded arity functions. (English) Zbl 1337.94019

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 27-51 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Zeroizing without low-level zeroes: new MMAP attacks and their limitations. (English) Zbl 1375.94114

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 247-266 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Secure computation from leaky correlated randomness. (English) Zbl 1352.94038

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 701-720 (2015).
MSC:  94A60 68Q87
PDFBibTeX XMLCite
Full Text: DOI

Cryptography with one-way communication. (English) Zbl 1351.94046

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 191-208 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Concurrent secure computation via non-black box simulation. (English) Zbl 1351.94048

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 23-42 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation. (English) Zbl 1375.94105

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 563-594 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Hosting services on an untrusted cloud. (English) Zbl 1371.94626

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 404-436 (2015).
MSC:  94A60 68P25 68M11
PDFBibTeX XMLCite
Full Text: DOI

On the practical security of inner product functional encryption. (English) Zbl 1345.94030

Katz, Jonathan (ed.), Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 777-798 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Public-coin differing-inputs obfuscation and its applications. (English) Zbl 1336.94054

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 668-697 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Obfuscation-based non-black-box simulation and four message concurrent zero knowledge for NP. (English) Zbl 1382.94151

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 638-667 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Functional encryption for randomized functionalities. (English) Zbl 1319.94064

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 325-351 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Round-efficient concurrently composable secure computation via a robust extraction lemma. (English) Zbl 1354.94030

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part I. Heidelberg: Springer (ISBN 978-3-662-46493-9/pbk). Lecture Notes in Computer Science 9014, 260-289 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Private interactive communication across an adversarial channel. (English) Zbl 1366.68043

Proceedings of the 5th conference on innovations in theoretical computer science, ITCS’14, Princeton, NJ, USA, January 11–14, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2243-0). 135-144 (2014).
MSC:  68P30 68M12 94A62
PDFBibTeX XMLCite
Full Text: DOI

On constant-round concurrent zero-knowledge from a knowledge assumption. (English) Zbl 1344.94050

Meier, Willi (ed.) et al., Progress in cryptology – INDOCRYPT 2014. 15th international conference on cryptology in India, New Delhi, India, December 14–17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13038-5/pbk; 978-3-319-13039-2/ebook). Lecture Notes in Computer Science 8885, 71-88 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI arXiv

Circuits resilient to additive attacks with applications to secure computation. (English) Zbl 1315.94073

Proceedings of the 46th annual ACM symposium on theory of computing, STOC ’14, New York, NY, USA, May 31 – June 3, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2710-7). 495-504 (2014).
MSC:  94A60 94C12
PDFBibTeX XMLCite
Full Text: DOI

How to use indistinguishability obfuscation: deniable encryption, and more. (English) Zbl 1315.94102

Proceedings of the 46th annual ACM symposium on theory of computing, STOC ’14, New York, NY, USA, May 31 – June 3, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2710-7). 475-484 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Black-box separations for differentially private protocols. (English) Zbl 1315.94083

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014, Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). Lecture Notes in Computer Science 8874, 386-405 (2014).
PDFBibTeX XMLCite
Full Text: DOI

Multi-input functional encryption. (English) Zbl 1327.94048

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 578-602 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Protecting obfuscation against algebraic attacks. (English) Zbl 1332.94055

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 221-238 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Replacing a random oracle: full domain hash from indistinguishability obfuscation. (English) Zbl 1332.94068

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 201-220 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Statistical concurrent non-malleable zero knowledge. (English) Zbl 1323.94132

Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 167-191 (2014).
MSC:  94A60 68P25 68Q15
PDFBibTeX XMLCite
Full Text: DOI

Obfuscation for evasive functions. (English) Zbl 1296.94077

Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 26-51 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Witness encryption and its applications. (English) Zbl 1293.94066

Proceedings of the 45th annual ACM symposium on theory of computing, STOC ’13. Palo Alto, CA, USA, June 1–4, 2013. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2029-0). 467-476 (2013).
MSC:  94A60 68Q17 94A62
PDFBibTeX XMLCite
Full Text: DOI

Discrete Gaussian leftover hash lemma over infinite domains. (English) Zbl 1320.94059

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 97-116 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Zero knowledge LTCs and their applications. (English) Zbl 1405.68114

Raghavendra, Prasad (ed.) et al., Approximation, randomization, and combinatorial optimization. Algorithms and techniques. 16th international workshop, APPROX 2013, and 17th international workshop, RANDOM 2013, Berkeley, CA, USA, August 21–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40327-9/pbk). Lecture Notes in Computer Science 8096, 607-622 (2013).
PDFBibTeX XMLCite
Full Text: DOI

Attribute-based encryption for circuits from multilinear maps. (English) Zbl 1311.94080

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 479-499 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures. (English) Zbl 1310.94151

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 494-512 (2013).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Secure computation against adaptive auxiliary information. (English) Zbl 1310.94132

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 316-334 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Accuracy-privacy tradeoffs for two-party differentially private protocols. (English) Zbl 1310.94149

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 298-315 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. (English) Zbl 1310.94148

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 75-92 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Robust pseudorandom generators. (English) Zbl 1336.94053

Fomin, Fedor V. (ed.) et al., Automata, languages, and programming. 40th international colloquium, ICALP 2013, Riga, Latvia, July 8–12, 2013, Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-39205-4/pbk). Lecture Notes in Computer Science 7965, 576-588 (2013).
MSC:  94A60 68Q25 94A55 94C10
PDFBibTeX XMLCite
Full Text: DOI

Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. (English) Zbl 1258.94005

Lecture Notes in Computer Science 7785. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). xi, 724 p. (2013).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

New impossibility results for concurrent composition and a non-interactive completeness theorem for secure computation. (English) Zbl 1297.94041

Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 443-460 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Dynamic credentials and ciphertext delegation for attribute-based encryption. (English) Zbl 1296.94139

Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 199-217 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Adaptively secure multi-party computation with dishonest majority. (English) Zbl 1294.94047

Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 105-123 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Concurrently secure computation in constant rounds. (English) Zbl 1297.94069

Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 99-116 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On efficient zero-knowledge PCPs. (English) Zbl 1304.68056

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 151-168 (2012).
MSC:  68Q15 94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient and explicit coding for interactive communication. (English) Zbl 1292.94014

Ostrovsky, Rafail (ed.), Proceedings of the 2011 IEEE 52nd annual symposium on foundations of computer science – FOCS 2011, Palm Springs, CA, USA, October 22–25. Los Alamitos, CA: IEEE Computer Society (ISBN 978-0-7695-4571-4; 978-1-4577-1843-4/ebook). 768-777 (2011).
MSC:  94A24 68M12
PDFBibTeX XMLCite
Full Text: DOI

Resettable cryptography in constant rounds – the case of zero knowledge. (English) Zbl 1227.94041

Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 390-406 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Constant-rate oblivious transfer from noisy channels. (English) Zbl 1290.94092

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 667-684 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Round optimal blind signatures. (English) Zbl 1290.94075

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 630-648 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Cryptography with tamperable and leaky memory. (English) Zbl 1287.94077

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 373-390 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Leakage-resilient zero knowledge. (English) Zbl 1288.68081

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 297-315 (2011).
MSC:  68Q15 94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient non-interactive secure computation. (English) Zbl 1290.94151

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 406-425 (2011).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Bringing people of different beliefs together to do UC. (English) Zbl 1295.94069

Ishai, Yuval (ed.), Theory of cryptography. 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28–30, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19570-9/pbk). Lecture Notes in Computer Science 6597, 311-328 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Functional encryption: definitions and challenges. (English) Zbl 1295.94027

Ishai, Yuval (ed.), Theory of cryptography. 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28–30, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19570-9/pbk). Lecture Notes in Computer Science 6597, 253-273 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fully secure accountable-authority identity-based encryption. (English) Zbl 1291.94147

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 296-316 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On invertible sampling and adaptive security. (English) Zbl 1253.94052

Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 466-482 (2010).
MSC:  94A60 94A20
PDFBibTeX XMLCite
Full Text: DOI

Interactive locking, zero-knowledge PCPs, and unconditional cryptography. (English) Zbl 1280.94063

Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 173-190 (2010).
MSC:  94A60 68T15
PDFBibTeX XMLCite
Full Text: DOI

Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. (English) Zbl 1279.94095

Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 62-91 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Founding cryptography on tamper-proof hardware tokens. (English) Zbl 1274.94072

Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 308-326 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On complete primitives for fairness. (English) Zbl 1274.94071

Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 91-108 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Extracting correlations. (English) Zbl 1292.94080

2009 IEEE 50th annual symposium on foundations of computer science – FOCS 2009. Proceedings of the symposium, Atlanta, GA, USA, October 24–27, 2009. Los Alamitos, CA: IEEE Computer Society (ISBN 978-0-7695-3850-1; 978-1-4244-5116-6/ebook). 261-270 (2009).
MSC:  94A60 68Q87 68M12
PDFBibTeX XMLCite
Full Text: DOI

Resolving the simultaneous resettability conjecture and a new non-black-box simulation strategy. (English) Zbl 1292.94054

2009 IEEE 50th annual symposium on foundations of computer science – FOCS 2009. Proceedings of the symposium, Atlanta, GA, USA, October 24–27, 2009. Los Alamitos, CA: IEEE Computer Society (ISBN 978-0-7695-3850-1; 978-1-4244-5116-6/ebook). 251-260 (2009).
MSC:  94A60 68M12 68P25
PDFBibTeX XMLCite
Full Text: DOI

Fast cryptographic primitives and circular-secure encryption based on hard learning problems. (English) Zbl 1252.94044

Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 595-618 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Resettably secure computation. (English) Zbl 1239.94050

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 54-71 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure arithmetic computation with no honest majority. (English) Zbl 1213.94111

Reingold, Omer (ed.), Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00456-8/pbk). Lecture Notes in Computer Science 5444, 294-314 (2009).
MSC:  94A60 68Q25 94A62
PDFBibTeX XMLCite
Full Text: DOI

Founding cryptography on oblivious transfer – efficiently. (English) Zbl 1183.94037

Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 572-591 (2008).
PDFBibTeX XMLCite
Full Text: DOI

Cryptography with constant computational overhead. (English) Zbl 1231.94050

STOC’08. Proceedings of the 40th annual ACM symposium on theory of computing 2008, Victoria, Canada, May 17–20, 2008. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-047-0). 433-442 (2008).
MSC:  94A60 68P25
PDFBibTeX XMLCite

Bounded ciphertext policy attribute based encryption. (English) Zbl 1155.94369

Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 579-591 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New constructions for UC secure computation using tamper-proof hardware. (English) Zbl 1149.68376

Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 545-562 (2008).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient non-interactive proof systems for bilinear groups. (English) Zbl 1149.94320

Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 415-432 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Precise concurrent zero knowledge. (English) Zbl 1149.94327

Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 397-414 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Predicate encryption supporting disjunctions, polynomial equations, and inner products. (English) Zbl 1149.94323

Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 146-162 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Zero-knowledge from secure multiparty computation. (English) Zbl 1232.68044

STOC’07. Proceedings of the 39th annual ACM symposium on theory of computing, San Diego, CA, USA, June 11–13, 2007. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-59593-631-8). 21-30 (2007).
PDFBibTeX XMLCite

Concurrent statistical zero-knowledge arguments for NP from one way functions. (English) Zbl 1153.94384

Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 444-459 (2007).
MSC:  94A60 68Q15
PDFBibTeX XMLCite
Full Text: DOI

Ring signatures of sub-linear size without random oracles. (English) Zbl 1171.94364

Arge, Lars (ed.) et al., Automata, languages and programming. 34th international colloquium, ICALP 2007, Wrocław, Poland, July 9–13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73419-2/pbk). Lecture Notes in Computer Science 4596, 423-434 (2007).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Private locally decodable codes. (English) Zbl 1171.94375

Arge, Lars (ed.) et al., Automata, languages and programming. 34th international colloquium, ICALP 2007, Wrocław, Poland, July 9–13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73419-2/pbk). Lecture Notes in Computer Science 4596, 387-398 (2007).
MSC:  94B35 94A62
PDFBibTeX XMLCite
Full Text: DOI

Fully collusion resistant traitor tracing with short ciphertexts and private keys. (English) Zbl 1140.94326

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 573-592 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Sequential aggregate signatures and multisignatures without random oracles. (English) Zbl 1140.94358

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 465-485 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Perfect non-interactive zero knowledge for NP. (English) Zbl 1129.94025

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 339-358 (2006).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Private circuits. II: Keeping secrets in tamperable circuits. (English) Zbl 1140.94347

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 308-327 (2006).
MSC:  94A60 94C10
PDFBibTeX XMLCite
Full Text: DOI

Non-interactive ZAPs and new techniques for NIZK. (English) Zbl 1129.94024

Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 97-111 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Concurrent zero knowledge without complexity assumptions. (English) Zbl 1112.94017

Halevi, Shai (ed.) et al., Theory of cryptography. Third theory of cryptography conference, TCC 2006, New York, NY, USA, March 4–7, 2006. Proceedings. Berlin: Springer (ISBN 3-540-32731-2/pbk). Lecture Notes in Computer Science 3876, 1-20 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fuzzy identity-based encryption. (English) Zbl 1137.94355

Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 457-473 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Relaxing environmental security: Monitored functionalities and client-server computation. (English) Zbl 1079.94569

Kilian, Joe (ed.), Theory of cryptography. Second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24573-1/pbk). Lecture Notes in Computer Science 3378, 104-127 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New notions of security: achieving universal composability without trusted setup. (English) Zbl 1192.94124

Proceedings of the 36th annual ACM symposium on theory of computing (STOC 2004), Chicago, IL, USA, June 13 - 15, 2004. New York, NY: ACM Press (ISBN 1-58113-852-0). 242-251, electronic only (2004).
MSC:  94A62 68M12 68P25
PDFBibTeX XMLCite
Full Text: DOI

Positive results and techniques for obfuscation. (English) Zbl 1122.94434

Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 20-39 (2004).
MSC:  94A62 68P25 68Q05 68Q15
PDFBibTeX XMLCite
Full Text: DOI

Private circuits: securing hardware against probing attacks. (English) Zbl 1122.94378

Boneh, Dan (ed.), Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40674-3/pbk). Lect. Notes Comput. Sci. 2729, 463-481 (2003).
MSC:  94A60 94C10
PDFBibTeX XMLCite
Full Text: DOI

Universally composable two-party and multi-party secure computation. (English) Zbl 1192.94112

Proceedings of the thirty-fourth annual ACM symposium on theory of computing (STOC 2002), Montreal, Quebec, Canada, May 19–21, 2002. New York, NY: ACM Press (ISBN 1-581-13495-9). 494-503, electronic only (2002).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: DOI

Robust non-interactive zero knowledge. (English) Zbl 1003.94526

Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 566-598 (2001).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: Link

On the (im)possibility of obfuscating programs (extended abstract). (English) Zbl 1001.68511

Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 1-18 (2001).
MSC:  68Q05 94A60 68P25
PDFBibTeX XMLCite
Full Text: Link

On perfect and adaptive security in exposure-resilient cryptography. (English) Zbl 0981.94014

Pfitzmann, Birgit (ed.), Advances in cryptology - EUROCRYPT 2001. 20th international conference on theory and application of cryptographic techniques, Innsbruck, Austria, May 6-10, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2045, 301-324 (2001).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: Link

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

Main Field

Software