×

Found 46 Documents (Results 1–46)

Registered attribute-based encryption. (English) Zbl 1528.94058

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14006, 511-542 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The role of explanatory virtues in abduction and IBE. (English) Zbl 07740527

Béziau, Jean-Yves (ed.) et al., Logic in question. Talks from the annual Sorbonne logic workshop (2011–2019), Paris, France, April 15–16, 2019. Cham: Birkhäuser. Stud. Univers. Log., 471-490 (2022).
PDFBibTeX XMLCite
Full Text: DOI

Simpler constructions of asymmetric primitives from obfuscation. (English) Zbl 1492.94104

Bhargavan, Karthikeyan (ed.) et al., Progress in cryptology – INDOCRYPT 2020. 21st international conference on cryptology in India, Bangalore, India, December 13–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12578, 715-738 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Registration-based encryption: removing private-key generator from IBE. (English) Zbl 1443.94057

Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 689-718 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Compact IBBE and fuzzy IBE from simple assumptions. (English) Zbl 1517.94103

Catalano, Dario (ed.) et al., Security and cryptography for networks. 11th international conference, SCN 2018, Amalfi, Italy, September 5–7, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11035, 563-582 (2018).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI HAL

Anonymous IBE, leakage resilience and circular security from new assumptions. (English) Zbl 1423.94056

Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10820, 535-564 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Practical implementation of Ring-SIS/LWE based signature and IBE. (English) Zbl 1425.94048

Lange, Tanja (ed.) et al., Post-quantum cryptography. 9th international conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9–11, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10786, 271-291 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Identity-based encryption from codes with rank metric. (English) Zbl 1390.94834

Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part III. Cham: Springer (ISBN 978-3-319-63696-2/pbk; 978-3-319-63697-9/ebook). Lecture Notes in Computer Science 10403, 194-224 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Déjà Q: encore! Un petit IBE. (English) Zbl 1377.94067

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49098-3/pbk; 978-3-662-49099-0/ebook). Lecture Notes in Computer Science 9563, 237-258 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Making any identity-based encryption accountable, efficiently. (English) Zbl 1504.94160

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 326-346 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Server-aided revocable identity-based encryption. (English) Zbl 1499.68057

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 286-304 (2015).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Switching lemma for bilinear tests and constant-size NIZK proofs for linear subspaces. (English) Zbl 1335.94057

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 295-312 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

(Hierarchical) identity-based encryption from affine message authentication. (English) Zbl 1345.94044

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 408-425 (2014).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Anonymous IBE from quadratic residuosity with improved performance. (English) Zbl 1318.94063

Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2014. 7th international conference on cryptology in Africa, Marrakesh, Morocco, May 28–30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06733-9/pbk). Lecture Notes in Computer Science 8469, 377-397 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Leakage resilient IBE and IPE under the DLIN assumption. (English) Zbl 1356.94067

Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25–28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 487-501 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Anonymous constant-size ciphertext HIBE from asymmetric pairings. (English) Zbl 1317.94132

Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17–19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 344-363 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Shorter quasi-adaptive NIZK proofs for linear subspaces. (English) Zbl 1300.94072

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 1-20 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An identity-based key-encapsulation mechanism built on identity-based factors selection. (English) Zbl 1312.94094

Youssef, Amr (ed.) et al., Progress in cryptology – AFRICACRYPT 2013. 6th international conference on cryptology in Africa, Cairo, Egypt, June 22–24, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38552-0/pbk). Lecture Notes in Computer Science 7918, 392-405 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Distributed public key schemes secure against continual leakage. (English) Zbl 1301.94103

Proceedings of the 2012 ACM symposium on principles of distributed computing, PODC ’12, Funchal, Portugal, July 16–18, 2012. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1450-3). 155-164 (2012).
MSC:  94A60 68M12 68M14
PDFBibTeX XMLCite
Full Text: DOI Link

Secure identity-based encryption in the quantum random oracle model. (English) Zbl 1296.94147

Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 758-775 (2012).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Outsider-anonymous broadcast encryption with sublinear ciphertexts. (English) Zbl 1290.94071

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 225-242 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Anonymous fuzzy identity-based encryption for similarity search. (English) Zbl 1311.94074

Cheong, Otfried (ed.) et al., Algorithms and computation. 21st international symposium, ISAAC 2010, Jeju Island, Korea, December 15–17, 2010. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-17516-9/pbk). Lecture Notes in Computer Science 6506, 61-72 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

How to construct interval encryption from binary tree encryption. (English) Zbl 1315.94085

Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13707-5/pbk). Lecture Notes in Computer Science 6123, 19-34 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient lattice (H)IBE in the standard model. (English) Zbl 1227.94022

Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 553-572 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure delegation of elliptic-curve pairing. (English) Zbl 1391.94738

Gollmann, Dieter (ed.) et al., Smart card research and advanced application. 9th IFIP WG 8.8/11.2 international conference, CARDIS 2010, Passau, Germany, April 14–16, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12509-6/pbk). Lecture Notes in Computer Science 6035, 24-35 (2010).
MSC:  94A60 14G50
Full Text: DOI

Fuzzy identity-based encryption: new and efficient schemes. (English) Zbl 1156.94332

Li, Yongqing (ed.) et al., Coding and cryptology. Proceedings of the first international workshop, Wuyi Mountain, Fujian, China, June 11–15, 2007. Hackensack, NJ: World Scientific (ISBN 978-981-283-223-8/hbk). Series on Coding Theory and Cryptology 4, 1-14 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Security and anonymity of identity-based encryption with multiple trusted authorities. (English) Zbl 1186.94465

Galbraith, Steven D. (ed.) et al., Pairing-based cryptography – Pairing 2008. Second international conference, Egham, UK, September 1–3, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85503-3/pbk). Lecture Notes in Computer Science 5209, 354-375 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improvements on security proofs of some identity based encryption schemes. (English) Zbl 1151.94636

Feng, Dengguo (ed.) et al., Information security and cryptology. First SKLOIS conference, CISC 2005, Beijing, China, December 15–17, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30855-5/pbk). Lecture Notes in Computer Science 3822, 28-41 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

Software