×

Found 126 Documents (Results 1–100)

Arithmetic sketching. (English) Zbl 07799094

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14081, 171-202 (2023).
PDFBibTeX XMLCite
Full Text: DOI

A lower bound on the length of signatures based on group actions and generic isogenies. (English) Zbl 1528.94091

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part V. Cham: Springer. Lect. Notes Comput. Sci. 14008, 507-531 (2023).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

HyperPlonk: Plonk with linear-time prover and high-degree custom gates. (English) Zbl 07773997

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 14005, 499-530 (2023).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Threshold signatures with private accountability. (English) Zbl 1517.94182

Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 13510, 551-581 (2022).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Halo Infinite: proof-carrying data from additive polynomial commitments. (English) Zbl 1485.94061

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12825, 649-680 (2021).
MSC:  94A60 68T05
PDFBibTeX XMLCite
Full Text: DOI

Improving speed and security in updatable encryption schemes. (English) Zbl 1511.94059

Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12493, 559-589 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Oblivious pseudorandom functions from isogenies. (English) Zbl 1511.94060

Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12492, 520-550 (2020).
MSC:  94A60 14K02 14H52
PDFBibTeX XMLCite
Full Text: DOI

Supersingular curves with small noninteger endomorphisms. (English) Zbl 1460.11093

Galbraith, Steven D. (ed.), ANTS XIV. Proceedings of the fourteenth algorithmic number theory symposium, Auckland, New Zealand, virtual event, June 29 – July 4, 2020. Berkeley, CA: Mathematical Sciences Publishers (MSP). Open Book Ser. 4, 7-22 (2020).
MSC:  11G20 14H52
PDFBibTeX XMLCite
Full Text: DOI arXiv

An airdrop that preserves recipient privacy. (English) Zbl 1459.94145

Bonneau, Joseph (ed.) et al., Financial cryptography and data security. 24th international conference, FC 2020 , Kota Kinabalu, Malaysia, February 10–14, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12059, 444-463 (2020).
PDFBibTeX XMLCite
Full Text: DOI

Zether: towards privacy in a smart contract world. (English) Zbl 1459.94101

Bonneau, Joseph (ed.) et al., Financial cryptography and data security. 24th international conference, FC 2020 , Kota Kinabalu, Malaysia, February 10–14, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12059, 423-443 (2020).
MSC:  94A60 91B64 91G20
PDFBibTeX XMLCite
Full Text: DOI

Batching techniques for accumulators with applications to IOPs and stateless blockchains. (English) Zbl 1456.94051

Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11692, 561-586 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Zero-knowledge proofs on secret-shared data via fully linear PCPs. (English) Zbl 1436.94043

Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11694, 67-97 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Using level-1 homomorphic encryption to improve threshold DSA signatures for Bitcoin wallet security. (English) Zbl 1454.94112

Lange, Tanja (ed.) et al., Progress in cryptology – LATINCRYPT 2017. 5th international conference on cryptology and information security in Latin America, Havana, Cuba, September 20–22, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11368, 352-377 (2019).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Post-quantum EPID signatures from symmetric primitives. (English) Zbl 1509.94152

Matsui, Mitsuru (ed.), Topics in cryptology – CT-RSA 2019. The cryptographers’ track at the RSA conference 2019, San Francisco, CA, USA, March 4–8, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11405, 251-271 (2019).
MSC:  94A62 94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Compact multi-signatures for smaller blockchains. (English) Zbl 1446.94105

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11273, 435-464 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Exploring crypto dark matter: new simple PRF candidates and their applications. (English) Zbl 1430.94059

Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11240, 699-729 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Threshold cryptosystems from threshold fully homomorphic encryption. (English) Zbl 1444.94047

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10991, 565-596 (2018).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Quasi-optimal SNARGs via linear multi-prover interactive proofs. (English) Zbl 1415.94413

Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10822, 222-255 (2018).
MSC:  94A60 68Q17
PDFBibTeX XMLCite
Full Text: DOI

Lattice-based DAPS and generalizations: self-enforcement in signature schemes. (English) Zbl 1521.94033

Gollmann, Dieter (ed.) et al., Applied cryptography and network security. 15th international conference, ACNS 2017, Kanazawa, Japan, July 10–12, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10355, 457-477 (2017).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Lattice-based SNARGs and their application to more efficient obfuscation. (English) Zbl 1415.94412

Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10212, 247-277 (2017).
MSC:  94A60 68Q17
PDFBibTeX XMLCite
Full Text: DOI

Private puncturable PRFs from standard lattice assumptions. (English) Zbl 1410.94049

Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10210, 415-445 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Constraining pseudorandom functions privately. (English) Zbl 1400.94124

Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-54387-0/pbk; 978-3-662-54388-7/ebook). Lecture Notes in Computer Science 10175, 494-524 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Surnaming schemes, fast verification, and applications to SGX technology. (English) Zbl 1383.94013

Handschuh, Helena (ed.), Topics in cryptology – CT-RSA 2017. The cryptographers’ track at the RSA conference 2017, San Francisco, CA, USA, February 14–17, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-52152-7/pbk; 978-3-319-52153-4/ebook). Lecture Notes in Computer Science 10159, 149-164 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Balloon hashing: a memory-hard function providing provable protection against sequential attacks. (English) Zbl 1404.94043

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 220-248 (2016).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation. (English) Zbl 1375.94105

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 563-594 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Hosting services on an untrusted cloud. (English) Zbl 1371.94626

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 404-436 (2015).
MSC:  94A60 68P25 68M11
PDFBibTeX XMLCite
Full Text: DOI

Bivariate polynomials modulo composites and their applications. (English) Zbl 1306.94032

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 42-62 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. (English) Zbl 1310.94130

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 480-499 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Low overhead broadcast encryption from multilinear maps. (English) Zbl 1317.94087

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 206-223 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. (English) Zbl 1327.94035

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 533-556 (2014).
MSC:  94A60 94C05
PDFBibTeX XMLCite
Full Text: DOI

Private database queries using somewhat homomorphic encryption. (English) Zbl 1330.94037

Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25–28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 102-118 (2013).
MSC:  94A60 68P15
PDFBibTeX XMLCite
Full Text: DOI

Function-private subspace-membership encryption and its applications. (English) Zbl 1327.94036

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 255-275 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Constrained pseudorandom functions and their applications. (English) Zbl 1314.94057

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 280-300 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Function-private identity-based encryption: hiding the function in functional encryption. (English) Zbl 1311.94071

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 461-478 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure signatures and chosen ciphertext security in a quantum computing world. (English) Zbl 1317.81074

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 361-379 (2013).
MSC:  81P94 94A62
PDFBibTeX XMLCite
Full Text: DOI

Key homomorphic PRFs and their applications. (English) Zbl 1310.94129

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 410-428 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Message-locked encryption for lock-dependent messages. (English) Zbl 1310.94120

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 374-391 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Quantum-secure message authentication codes. (English) Zbl 1312.94111

Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 592-608 (2013).
MSC:  94A62 81P68
PDFBibTeX XMLCite
Full Text: DOI

Targeted malleability: homomorphic encryption for restricted computations. (English) Zbl 1347.68119

Proceedings of the 3rd conference on innovations in theoretical computer science, ITCS’12, Cambridge, MA, USA, January 8–10, 2012. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1115-1). 350-366 (2012).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Pairing-based cryptography: past, present, and future. (English) Zbl 1292.94034

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 1 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Computing on authenticated data. (English) Zbl 1292.94017

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 1-20 (2012).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Random oracles in a quantum world. (English) Zbl 1227.94033

Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 41-69 (2011).
MSC:  94A60 81P94 94A62
PDFBibTeX XMLCite
Full Text: DOI arXiv

Homomorphic signatures for polynomial functions. (English) Zbl 1281.94072

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 149-168 (2011).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Functional encryption: definitions and challenges. (English) Zbl 1295.94027

Ishai, Yuval (ed.), Theory of cryptography. 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28–30, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19570-9/pbk). Lecture Notes in Computer Science 6597, 253-273 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. (English) Zbl 1291.94181

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 1-16 (2011).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE. (English) Zbl 1280.94035

Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 98-115 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient lattice (H)IBE in the standard model. (English) Zbl 1227.94022

Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 553-572 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Preventing pollution attacks in multi-source network coding. (English) Zbl 1279.94050

Nguyen, Phong Q. (ed.) et al., Public key cryptography – PKC 2010. 13th international conference on practice and theory in public key cryptography, Paris, France, May 26–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13012-0/pbk). Lecture Notes in Computer Science 6056, 161-176 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Signing a linear subspace: Signature schemes for network coding. (English) Zbl 1227.68024

Jarecki, Stanisław (ed.) et al., Public key cryptography – PKC 2009. 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00467-4/pbk). Lecture Notes in Computer Science 5443, 68-87 (2009).
MSC:  68P25 94A62
PDFBibTeX XMLCite
Full Text: DOI

Generalized identity based and broadcast encryption schemes. (English) Zbl 1206.94054

Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 455-470 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Circular-secure encryption from decision Diffie-Hellman. (English) Zbl 1183.94025

Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 108-125 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Public key encryption that allows PIR queries. (English) Zbl 1215.68096

Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 50-67 (2007).
PDFBibTeX XMLCite
Full Text: DOI

Bilinear groups of composite order. (English) Zbl 1151.94484

Takagi, Tsuyoshi (ed.) et al., Pairing-based cryptography – Pairing 2007. First international conference, Tokyo, Japan, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73488-8/pbk). Lecture Notes in Computer Science 4575, 1 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Conjunctive, subset, and range queries on encrypted data. (English) Zbl 1156.94335

Vadhan, Salil P. (ed.), Theory of cryptography. 4th theory of cryptography conference, TCC 2007, Amsterdam, The Netherlands, February 21–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-70935-0/pbk). Lecture Notes in Computer Science 4392, 535-554 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Privacy in encrypted content distribution using private broadcast encryption. (English) Zbl 1152.94402

Di Crescenzo, Giovanni (ed.) et al., Financial cryptography and data security. 10th international conference, FC 2006, Anguilla, British West Indies, February 27–March 2, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-46255-2/pbk). Lecture Notes in Computer Science 4107, 52-64 (2006).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Fully collusion resistant traitor tracing with short ciphertexts and private keys. (English) Zbl 1140.94326

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 573-592 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

On the impossibility of efficiently combining collision resistant hash functions. (English) Zbl 1138.94347

Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 570-583 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Strongly unforgeable signatures based on computational Diffie-Hellman. (English) Zbl 1151.94485

Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 229-240 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Chosen ciphertext secure public key threshold encryption without random oracles. (English) Zbl 1125.94012

Pointcheval, David (ed.), Topics in cryptology – CT-RSA 2006. The cryptographers’ track at the RSA conference 2006, San Jose, CA, USA, February 13–17, 2006. Proceedings. Berlin: Springer (ISBN 3-540-31033-9/pbk). Lecture Notes in Computer Science 3860, 226-243 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Hierarchical identity based encryption with constant size ciphertext. (English) Zbl 1137.94340

Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 440-456 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Collusion resistant broadcast encryption with short ciphertexts and private keys. (English) Zbl 1145.94434

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 258-275 (2005).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. (English) Zbl 1079.94535

Menezes, Alfred (ed.), Topics in cryptology – CT-RSA 2005. The cryptographers’ track at the RSA conference 2005, San Francisco, CA, USA, February 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24399-2/pbk). Lecture Notes in Computer Science 3376, 87-103 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Public key encryption with keyword search. (English) Zbl 1122.68424

Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 506-522 (2004).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient selective-id secure identity-based encryption without random oracles. (English) Zbl 1122.94355

Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 223-238 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Short signatures without random oracles. (English) Zbl 1122.94354

Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 56-73 (2004).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Short group signatures. (English) Zbl 1104.94044

Franklin, Matt (ed.), Advances in cryptology – CRYPTO 2004. 24th annual international cryptology conference, Santa Barbara, California, USA, August 15–19, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22668-0/pbk). Lecture Notes in Computer Science 3152, 41-55 (2004).
MSC:  94A62 11T71 14G50
PDFBibTeX XMLCite
Full Text: DOI

Secure identity based encryption without random oracles. (English) Zbl 1104.94019

Franklin, Matt (ed.), Advances in cryptology – CRYPTO 2004. 24th annual international cryptology conference, Santa Barbara, California, USA, August 15–19, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22668-0/pbk). Lecture Notes in Computer Science 3152, 443-459 (2004).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Oblivious signature-based envelope. (English) Zbl 1321.94075

Proceedings of the 22nd annual ACM symposium on principles of distributed computing, PODC ’03, Boston, MA, USA, July 13–16, 2003. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-708-7). 182-189 (2003).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

The design and implementation of protocol-based hidden key recovery. (English) Zbl 1255.94055

Boyd, Colin (ed.) et al., Information security. 6th international conference, ISC 2003, Bristol, UK, October 1–3, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20176-9/pbk). Lect. Notes Comput. Sci. 2851, 165-179 (2003).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI

Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. (English) Zbl 1027.00041

Lecture Notes in Computer Science. 2729. Berlin: Springer. xii, 631 p. (2003).
PDFBibTeX XMLCite
Full Text: DOI Link

Aggregate and verifiably encrypted signatures from bilinear maps. (English) Zbl 1038.94553

Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 416-432 (2003).
MSC:  94A62 94A60 68P25
PDFBibTeX XMLCite
Full Text: Link

Applications of multilinear forms to cryptography. (English) Zbl 1030.94032

Melles, Caroline Grant (ed.) et al., Topics in algebraic and noncommutative geometry. Proceedings in memory of Ruth Michler, Luminy, France, July 20-22, 2001 and Annapolis, MD, USA, October 25-28, 2001. Providence, RI: American Mathematical Society (AMS). Contemp. Math. 324, 71-90 (2003).
MSC:  94A60 14G50
PDFBibTeX XMLCite

A secure signature scheme from bilinear maps. (English) Zbl 1039.94522

Joye, Marc (ed.), Topics in cryptology – CT-RSA 2003. The cryptographers’ track at the RSA conference 2003, San Francisco, CA, USA, April 13–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00847-0/pbk). Lect. Notes Comput. Sci. 2612, 98-110 (2003).
MSC:  94A62 68Q25
PDFBibTeX XMLCite
Full Text: Link

Optimistic mixing for exit-polls. (English) Zbl 1065.94548

Zheng, Yuliang (ed.), Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1–5, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00171-9). Lect. Notes Comput. Sci. 2501, 451-465 (2002).
MSC:  94A60 91B10 68P25
PDFBibTeX XMLCite
Full Text: DOI

Short signatures from the Weil pairing. (English) Zbl 1064.94554

Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 514-532 (2001).
MSC:  94A62 14G50
PDFBibTeX XMLCite
Full Text: Link

The modular inversion hidden number problem. (English) Zbl 1062.94545

Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 36-51 (2001).
MSC:  94A60 11T71 68Q25
PDFBibTeX XMLCite
Full Text: Link

On the unpredictability of bits of the elliptic curve Diffie-Hellman scheme. (English) Zbl 1002.94025

Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 201-212 (2001).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: Link

Lower bounds for multicast message authentication. (English) Zbl 0981.94037

Pfitzmann, Birgit (ed.), Advances in cryptology - EUROCRYPT 2001. 20th international conference on theory and application of cryptographic techniques, Innsbruck, Austria, May 6-10, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2045, 437-452 (2001).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: Link

Finding smooth integers in short intervals using CRT decoding. (English) Zbl 1296.94165

Proceedings of the thirty-second annual ACM symposium on theory of computing (STOC 2000), Portland, Oregon, USA, May 21–23, 2000. New York, NY: ACM Press (ISBN 1-58113-184-4). 265-272 (2000).
MSC:  94B35
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software