×

Found 11 Documents (Results 1–11)

UC priced oblivious transfer with purchase statistics and dynamic pricing. (English) Zbl 1456.94068

Hao, Feng (ed.) et al., Progress in cryptology – INDOCRYPT 2019. 20th international conference on cryptology in India, Hyderabad, India, December 15–18, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11898, 273-296 (2019).
MSC:  94A60 68P25 91B74
PDFBibTeX XMLCite
Full Text: DOI Link

UC commitments for modular protocol design and applications to revocation and attribute tokens. (English) Zbl 1406.94031

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part III. Berlin: Springer (ISBN 978-3-662-53014-6/pbk; 978-3-662-53015-3/ebook). Lecture Notes in Computer Science 9816, 208-239 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Composable and modular anonymous credentials: definitions and practical constructions. (English) Zbl 1375.94107

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 262-288 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

On the impossibility of structure-preserving deterministic primitives. (English) Zbl 1326.94066

Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 713-738 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Oblivious transfer with hidden access control from attribute-based encryption. (English) Zbl 1344.94033

Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 559-579 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient structure-preserving signature scheme from standard assumptions. (English) Zbl 1310.94176

Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 76-94 (2012).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Oblivious transfer with hidden access control policies. (English) Zbl 1291.94064

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 192-209 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field