×

Found 44 Documents (Results 1–44)

How to use (plain) witness encryption: registered ABE, flexible broadcast, and more. (English) Zbl 07800219

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 14084, 498-531 (2023).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Universal amplification of KDM security: from 1-key circular to multi-key KDM. (English) Zbl 07799237

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 14082, 674-693 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Registered attribute-based encryption. (English) Zbl 1528.94058

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14006, 511-542 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fully adaptive decentralized multi-authority ABE. (English) Zbl 1528.94041

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14006, 447-478 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Dynamic collusion bounded functional encryption from identity-based encryption. (English) Zbl 1496.94045

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13276, 736-763 (2022).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Adaptive security via deletion in attribute-based encryption: solutions from search assumptions in bilinear groups. (English) Zbl 1515.94070

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 13093, 311-341 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Beyond software watermarking: traitor-tracing for pseudorandom functions. (English) Zbl 07684807

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13092, 250-280 (2021).
MSC:  68P25 68Nxx 94A60
PDFBibTeX XMLCite
Full Text: DOI

On the CCA compatibility of public-key infrastructure. (English) Zbl 1479.94200

Garay, Juan A. (ed.), Public-key cryptography – PKC 2021. 24th IACR international conference on practice and theory of public key cryptography, virtual event, May 10–13, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12711, 235-260 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Black-box non-interactive non-malleable commitments. (English) Zbl 07440637

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12698, 159-185 (2021).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Decentralized multi-authority ABE for DNFs from LWE. (English) Zbl 1479.94153

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12696, 177-209 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Chosen ciphertext security from injective trapdoor functions. (English) Zbl 1504.94146

Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12170, 836-866 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New constructions of hinting PRGs, OWFs with encryption, and more. (English) Zbl 1503.94029

Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12170, 527-558 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Output compression, MPC, and iO for Turing machines. (English) Zbl 1483.68103

Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11921, 342-370 (2019).
PDFBibTeX XMLCite
Full Text: DOI

Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption. (English) Zbl 1509.94105

Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11693, 671-700 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Broadcast and trace with \(N^{\varepsilon}\) ciphertext size from standard assumptions. (English) Zbl 1509.94093

Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11694, 826-855 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Watermarking public-key cryptographic primitives. (English) Zbl 1509.94160

Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11694, 367-398 (2019).
PDFBibTeX XMLCite
Full Text: DOI

Collusion resistant traitor tracing from learning with errors. (English) Zbl 1428.68087

Diakonikolas, Ilias (ed.) et al., Proceedings of the 50th annual ACM SIGACT symposium on theory of computing, STOC ’18, Los Angeles, CA, USA, June 25–29, 2018. New York, NY: Association for Computing Machinery (ACM). 660-670 (2018).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Traitor-tracing from LWE made simple and attribute-based. (English) Zbl 1430.94065

Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11240, 341-369 (2018).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Deterministic public-key encryption under continual leakage. (English) Zbl 1348.94063

Manulis, Mark (ed.) et al., Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19–22, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). Lecture Notes in Computer Science 9696, 304-323 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient statically-secure large-universe multi-authority attribute-based encryption. (English) Zbl 1415.94458

Böhme, Rainer (ed.) et al., Financial cryptography and data security. 19th international conference, FC 2015, San Juan, Puerto Rico, January 26–30, 2015. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 8975, 315-332 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Separations in circular security for arbitrary length key cycles. (English) Zbl 1319.94074

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 378-400 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

How to use indistinguishability obfuscation: deniable encryption, and more. (English) Zbl 1315.94102

Proceedings of the 46th annual ACM symposium on theory of computing, STOC ’14, New York, NY, USA, May 31 – June 3, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2710-7). 475-484 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Relaxed two-to-one recoding schemes. (English) Zbl 1309.94150

Abdalla, Michel (ed.) et al., Security and cryptography for networks. 9th international conference, SCN 2014, Amalfi, Italy, September 3–5, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-10878-0/pbk). Lecture Notes in Computer Science 8642, 57-76 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Replacing a random oracle: full domain hash from indistinguishability obfuscation. (English) Zbl 1332.94068

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 201-220 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Rethinking verifiably encrypted signatures: a gap in functionality and potential solutions. (English) Zbl 1290.94146

Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 349-366 (2014).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Encoding functions with constant online rate or how to compress garbled circuits keys. (English) Zbl 1298.94076

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 166-184 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Targeted malleability: homomorphic encryption for restricted computations. (English) Zbl 1347.68119

Proceedings of the 3rd conference on innovations in theoretical computer science, ITCS’12, Cambridge, MA, USA, January 8–10, 2012. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1115-1). 350-366 (2012).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Signing a linear subspace: Signature schemes for network coding. (English) Zbl 1227.68024

Jarecki, Stanisław (ed.) et al., Public key cryptography – PKC 2009. 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00467-4/pbk). Lecture Notes in Computer Science 5443, 68-87 (2009).
MSC:  68P25 94A62
PDFBibTeX XMLCite
Full Text: DOI

Compact proofs of retrievability. (English) Zbl 1206.68110

Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 90-107 (2008).
MSC:  68P20 68P25
PDFBibTeX XMLCite
Full Text: DOI

Lossy trapdoor functions and their applications. (English) Zbl 1228.94027

STOC’08. Proceedings of the 40th annual ACM symposium on theory of computing 2008, Victoria, Canada, May 17–20, 2008. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-047-0). 187-196 (2008).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Privacy in encrypted content distribution using private broadcast encryption. (English) Zbl 1152.94402

Di Crescenzo, Giovanni (ed.) et al., Financial cryptography and data security. 10th international conference, FC 2006, Anguilla, British West Indies, February 27–March 2, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-46255-2/pbk). Lecture Notes in Computer Science 4107, 52-64 (2006).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Secure conjunctive keyword search over encrypted data. (English) Zbl 1103.68514

Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 31-45 (2004).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field

all top 3

Software