×

Found 78 Documents (Results 1–78)

New realizations of somewhere statistically binding hashing and positional accumulators. (English) Zbl 1396.94093

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 121-145 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Adaptively secure puncturable pseudorandom functions in the standard model. (English) Zbl 1396.94084

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 79-102 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New circular security counterexamples from decision linear and learning with errors. (English) Zbl 1382.94069

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 776-800 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A punctured programming approach to adaptively secure functional encryption. (English) Zbl 1351.94071

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 678-697 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Universal signature aggregators. (English) Zbl 1326.94127

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 3-34 (2015).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient statically-secure large-universe multi-authority attribute-based encryption. (English) Zbl 1415.94458

Böhme, Rainer (ed.) et al., Financial cryptography and data security. 19th international conference, FC 2015, San Juan, Puerto Rico, January 26–30, 2015. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 8975, 315-332 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Indistinguishability obfuscation for Turing machines with unbounded memory. (English) Zbl 1321.94069

Proceedings of the 47th annual ACM symposium on theory of computing, STOC ’15, Portland, OR, USA, June 14–17, 2015. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-3536-2). 419-428 (2015).
MSC:  94A60 68Q05
PDFBibTeX XMLCite
Full Text: DOI

Separations in circular security for arbitrary length key cycles. (English) Zbl 1319.94074

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 378-400 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

How to use indistinguishability obfuscation: deniable encryption, and more. (English) Zbl 1315.94102

Proceedings of the 46th annual ACM symposium on theory of computing, STOC ’14, New York, NY, USA, May 31 – June 3, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2710-7). 475-484 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Relaxed two-to-one recoding schemes. (English) Zbl 1309.94150

Abdalla, Michel (ed.) et al., Security and cryptography for networks. 9th international conference, SCN 2014, Amalfi, Italy, September 3–5, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-10878-0/pbk). Lecture Notes in Computer Science 8642, 57-76 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Witness encryption from instance independent assumptions. (English) Zbl 1345.94064

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 426-443 (2014).
MSC:  94A60 68Q17
PDFBibTeX XMLCite
Full Text: DOI

Low overhead broadcast encryption from multilinear maps. (English) Zbl 1317.94087

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 206-223 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Replacing a random oracle: full domain hash from indistinguishability obfuscation. (English) Zbl 1332.94068

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 201-220 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Why proving HIBE systems secure is difficult. (English) Zbl 1326.94109

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 58-76 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Rethinking verifiably encrypted signatures: a gap in functionality and potential solutions. (English) Zbl 1290.94146

Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 349-366 (2014).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Online/Offline attribute-based encryption. (English) Zbl 1335.94050

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 293-310 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Witness encryption and its applications. (English) Zbl 1293.94066

Proceedings of the 45th annual ACM symposium on theory of computing, STOC ’13. Palo Alto, CA, USA, June 1–4, 2013. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2029-0). 467-476 (2013).
MSC:  94A60 68Q17 94A62
PDFBibTeX XMLCite
Full Text: DOI

Constrained pseudorandom functions and their applications. (English) Zbl 1314.94057

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 280-300 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Attribute-based encryption for circuits from multilinear maps. (English) Zbl 1311.94080

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 479-499 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Encoding functions with constant online rate or how to compress garbled circuits keys. (English) Zbl 1298.94076

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 166-184 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures. (English) Zbl 1310.94151

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 494-512 (2013).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. (English) Zbl 1310.94148

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 75-92 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Attribute-based encryption with fast decryption. (English) Zbl 1314.94074

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 162-179 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Functional encryption: origins and recent developments. (English) Zbl 1314.94096

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 51-54 (2013).
MSC:  94A60 94-02
PDFBibTeX XMLCite
Full Text: DOI

The \(k\)-BDH assumption family: bilinear map cryptography from progressively weaker assumptions. (English) Zbl 1312.94033

Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 310-325 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Targeted malleability: homomorphic encryption for restricted computations. (English) Zbl 1347.68119

Proceedings of the 3rd conference on innovations in theoretical computer science, ITCS’12, Cambridge, MA, USA, January 8–10, 2012. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1115-1). 350-366 (2012).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Dual form signatures: an approach for proving security from static assumptions. (English) Zbl 1290.94149

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 25-42 (2012).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Dynamic credentials and ciphertext delegation for attribute-based encryption. (English) Zbl 1296.94139

Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 199-217 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New proof methods for attribute-based encryption: achieving full security through selective techniques. (English) Zbl 1296.94128

Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 180-198 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Detecting dangerous queries: a new approach for chosen ciphertext security. (English) Zbl 1297.94077

Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 663-681 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Standard security does not imply security against selective-opening. (English) Zbl 1297.94046

Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 645-662 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Identity-based (lossy) trapdoor functions and applications. (English) Zbl 1297.94047

Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 228-245 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Computing on authenticated data. (English) Zbl 1292.94017

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 1-20 (2012).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Storing secrets on continually leaky devices. (English) Zbl 1292.94055

Ostrovsky, Rafail (ed.), Proceedings of the 2011 IEEE 52nd annual symposium on foundations of computer science – FOCS 2011, Palm Springs, CA, USA, October 22–25. Los Alamitos, CA: IEEE Computer Society (ISBN 978-0-7695-4571-4; 978-1-4577-1843-4/ebook). 688-697 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

How to leak on key updates. (English) Zbl 1288.94074

Proceedings of the 43rd annual ACM symposium on theory of computing, STOC ’11. San Jose, CA, USA, June 6–8, 2011. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-0691-1). 725-734 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Bi-deniable public-key encryption. (English) Zbl 1290.94113

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 525-542 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Decentralizing attribute-based encryption. (English) Zbl 1290.94106

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 568-588 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Unbounded HIBE and attribute-based encryption. (English) Zbl 1290.94105

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 547-567 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Functional encryption: definitions and challenges. (English) Zbl 1295.94027

Ishai, Yuval (ed.), Theory of cryptography. 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28–30, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19570-9/pbk). Lecture Notes in Computer Science 6597, 253-273 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Identity-based encryption secure against selective opening attack. (English) Zbl 1295.94020

Ishai, Yuval (ed.), Theory of cryptography. 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28–30, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19570-9/pbk). Lecture Notes in Computer Science 6597, 235-252 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Achieving leakage resilience through dual system encryption. (English) Zbl 1291.94118

Ishai, Yuval (ed.), Theory of cryptography. 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28–30, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19570-9/pbk). Lecture Notes in Computer Science 6597, 70-88 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. (English) Zbl 1291.94165

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 53-70 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Shrinking the keys of discrete-log-type lossy trapdoor functions. (English) Zbl 1315.94062

Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13707-5/pbk). Lecture Notes in Computer Science 6123, 35-52 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Constructing verifiable random functions with large input spaces. (English) Zbl 1280.94068

Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 656-672 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. (English) Zbl 1279.94095

Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 62-91 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New techniques for dual system encryption and fully secure HIBE with short ciphertexts. (English) Zbl 1274.94092

Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 455-479 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Short and stateless signatures from the RSA assumption. (English) Zbl 1252.94074

Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 654-670 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. (English) Zbl 1252.94101

Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 619-636 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Pairing-based cryptography – Pairing 2009. Third international conference Palo Alto, CA, USA, August 12–14, 2009. Proceedings. (English) Zbl 1169.94002

Lecture Notes in Computer Science 5671. Berlin: Springer (ISBN 978-3-642-03297-4/pbk). x, 267 p. (2009).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Realizing hash-and-sign signatures under standard assumptions. (English) Zbl 1239.94075

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 333-350 (2009).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Adaptive security in broadcast encryption systems (with short ciphertexts). (English) Zbl 1239.94073

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 171-188 (2009).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Signing a linear subspace: Signature schemes for network coding. (English) Zbl 1227.68024

Jarecki, Stanisław (ed.) et al., Public key cryptography – PKC 2009. 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00467-4/pbk). Lecture Notes in Computer Science 5443, 68-87 (2009).
MSC:  68P25 94A62
PDFBibTeX XMLCite
Full Text: DOI

Predicate privacy in encryption systems. (English) Zbl 1213.94133

Reingold, Omer (ed.), Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00456-8/pbk). Lecture Notes in Computer Science 5444, 457-473 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

A framework for efficient and composable oblivious transfer. (English) Zbl 1183.94046

Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 554-571 (2008).
PDFBibTeX XMLCite
Full Text: DOI

Lossy trapdoor functions and their applications. (English) Zbl 1228.94027

STOC’08. Proceedings of the 40th annual ACM symposium on theory of computing 2008, Victoria, Canada, May 17–20, 2008. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-047-0). 187-196 (2008).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Delegating capabilities in predicate encryption systems. (English) Zbl 1155.94385

Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 560-578 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Predicate encryption supporting disjunctions, polynomial equations, and inner products. (English) Zbl 1149.94323

Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 146-162 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient ring signatures without random oracles. (English) Zbl 1127.94027

Okamoto, Tatsuaki (ed.) et al., Public key cryptography – PKC 2007. 10th international conference on practice and theory in public-key cryptography, Beijing, China, April 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-71676-1/pbk). Lecture Notes in Computer Science 4450, 166-180 (2007).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Full-domain subgroup hiding and constant-size group signatures. (English) Zbl 1127.94020

Okamoto, Tatsuaki (ed.) et al., Public key cryptography – PKC 2007. 10th international conference on practice and theory in public-key cryptography, Beijing, China, April 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-71676-1/pbk). Lecture Notes in Computer Science 4450, 1-15 (2007).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Conjunctive, subset, and range queries on encrypted data. (English) Zbl 1156.94335

Vadhan, Salil P. (ed.), Theory of cryptography. 4th theory of cryptography conference, TCC 2007, Amsterdam, The Netherlands, February 21–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-70935-0/pbk). Lecture Notes in Computer Science 4392, 535-554 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Privacy in encrypted content distribution using private broadcast encryption. (English) Zbl 1152.94402

Di Crescenzo, Giovanni (ed.) et al., Financial cryptography and data security. 10th international conference, FC 2006, Anguilla, British West Indies, February 27–March 2, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-46255-2/pbk). Lecture Notes in Computer Science 4107, 52-64 (2006).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Fully collusion resistant traitor tracing with short ciphertexts and private keys. (English) Zbl 1140.94326

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 573-592 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Sequential aggregate signatures and multisignatures without random oracles. (English) Zbl 1140.94358

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 465-485 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Compact group signatures without random oracles. (English) Zbl 1140.94327

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 427-444 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Anonymous hierarchical identity-based encryption (without random oracles). (English) Zbl 1161.94390

Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 290-307 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Strongly unforgeable signatures based on computational Diffie-Hellman. (English) Zbl 1151.94485

Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 229-240 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Fuzzy identity-based encryption. (English) Zbl 1137.94355

Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 457-473 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient identity-based encryption without random oracles. (English) Zbl 1137.94360

Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 114-127 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Collusion resistant broadcast encryption with short ciphertexts and private keys. (English) Zbl 1145.94434

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 258-275 (2005).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Secure conjunctive keyword search over encrypted data. (English) Zbl 1103.68514

Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 31-45 (2004).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field

Software