Damodaran, Aditya; Dubovitskaya, Maria; Rial, Alfredo UC priced oblivious transfer with purchase statistics and dynamic pricing. (English) Zbl 1456.94068 Hao, Feng (ed.) et al., Progress in cryptology – INDOCRYPT 2019. 20th international conference on cryptology in India, Hyderabad, India, December 15–18, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11898, 273-296 (2019). MSC: 94A60 68P25 91B74 PDFBibTeX XMLCite \textit{A. Damodaran} et al., Lect. Notes Comput. Sci. 11898, 273--296 (2019; Zbl 1456.94068) Full Text: DOI Link
Camenisch, Jan; Dubovitskaya, Maria; Towa, Patrick Efficient fully secure leakage-deterring encryption. (English) Zbl 1454.94056 Albrecht, Martin (ed.), Cryptography and coding. 17th IMA international conference, IMACC 2019, Oxford, UK, December 16–18, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11929, 102-127 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 11929, 102--127 (2019; Zbl 1454.94056) Full Text: DOI
Abe, Masayuki; Camenisch, Jan; Dowsley, Rafael; Dubovitskaya, Maria On the impossibility of structure-preserving deterministic primitives. (English) Zbl 1435.94120 J. Cryptology 32, No. 1, 239-264 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Abe} et al., J. Cryptology 32, No. 1, 239--264 (2019; Zbl 1435.94120) Full Text: DOI
Camenisch, Jan; Dubovitskaya, Maria; Rial, Alfredo UC commitments for modular protocol design and applications to revocation and attribute tokens. (English) Zbl 1406.94031 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part III. Berlin: Springer (ISBN 978-3-662-53014-6/pbk; 978-3-662-53015-3/ebook). Lecture Notes in Computer Science 9816, 208-239 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 9816, 208--239 (2016; Zbl 1406.94031) Full Text: DOI Link
Camenisch, Jan; Dubovitskaya, Maria; Haralambiev, Kristiyan; Kohlweiss, Markulf Composable and modular anonymous credentials: definitions and practical constructions. (English) Zbl 1375.94107 Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 262-288 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 9453, 262--288 (2015; Zbl 1375.94107) Full Text: DOI Link
Abe, Masayuki; Camenisch, Jan; Dowsley, Rafael; Dubovitskaya, Maria On the impossibility of structure-preserving deterministic primitives. (English) Zbl 1326.94066 Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 713-738 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Abe} et al., Lect. Notes Comput. Sci. 8349, 713--738 (2014; Zbl 1326.94066) Full Text: DOI
Camenisch, Jan; Dubovitskaya, Maria; Enderlein, Robert R.; Neven, Gregory Oblivious transfer with hidden access control from attribute-based encryption. (English) Zbl 1344.94033 Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 559-579 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 7485, 559--579 (2012; Zbl 1344.94033) Full Text: DOI
Camenisch, Jan; Dubovitskaya, Maria; Haralambiev, Kristiyan Efficient structure-preserving signature scheme from standard assumptions. (English) Zbl 1310.94176 Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 76-94 (2012). MSC: 94A62 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 7485, 76--94 (2012; Zbl 1310.94176) Full Text: DOI
Camenisch, Jan; Dubovitskaya, Maria; Neven, Gregory; Zaverucha, Gregory M. Oblivious transfer with hidden access control policies. (English) Zbl 1291.94064 Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 192-209 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 6571, 192--209 (2011; Zbl 1291.94064) Full Text: DOI
Dubovitskaia, M. A. Activity of O.Iu. Schmidt in the Moscow State University. (Russian) Zbl 1196.01008 Istor.-Mat. Issled. (2) 13(48), 138-153 (2009). Reviewer: Roman Murawski (Poznań) MSC: 01A60 PDFBibTeX XMLCite \textit{M. A. Dubovitskaia}, Istor.-Mat. Issled. (2) 13(48), 138--153 (2009; Zbl 1196.01008)
Dubovitskaya, M. A. On the Brauer group of a two-dimensional local field. (English. Russian original) Zbl 1134.11043 Math. Notes 81, No. 6, 753-756 (2007); translation from Mat. Zametki 81, No. 6, 838-841 (2007). Reviewer: Andrea Bandini (Pisa) MSC: 11S80 PDFBibTeX XMLCite \textit{M. A. Dubovitskaya}, Math. Notes 81, No. 6, 753--756 (2007; Zbl 1134.11043); translation from Mat. Zametki 81, No. 6, 838--841 (2007) Full Text: DOI