×

Found 51 Documents (Results 1–51)

Public key encryption with secure key leasing. (English) Zbl 07789173

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14004, 581-610 (2023).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI arXiv

Functional encryption with secure key leasing. (English) Zbl 1524.68122

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 13794, 569-598 (2023).
PDFBibTeX XMLCite
Full Text: DOI arXiv

Bounded functional encryption for Turing machines: adaptive security from general assumptions. (English) Zbl 1519.94027

Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13747, 618-647 (2023).
MSC:  94A60 68Q04
PDFBibTeX XMLCite
Full Text: DOI

KDM security for the Fujisaki-Okamoto transformations in the QROM. (English) Zbl 1519.94145

Hanaoka, Goichiro (ed.) et al., Public-key cryptography – PKC 2022. 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8–11, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13178, 286-315 (2022).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The direction of updatable encryption does matter. (English) Zbl 1519.94180

Hanaoka, Goichiro (ed.) et al., Public-key cryptography – PKC 2022. 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8–11, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13178, 194-224 (2022).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Certified everlasting zero-knowledge proof for QMA. (English) Zbl 1516.94034

Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13507, 239-268 (2022).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI arXiv

Watermarking PRFs against quantum adversaries. (English) Zbl 1502.81028

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13277, 488-518 (2022).
PDFBibTeX XMLCite
Full Text: DOI arXiv

Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication. (English) Zbl 1522.81070

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13090, 606-636 (2021).
PDFBibTeX XMLCite
Full Text: DOI arXiv

Universal proxy re-encryption. (English) Zbl 1514.94077

Garay, Juan A. (ed.), Public-key cryptography – PKC 2021. 24th IACR international conference on practice and theory of public key cryptography, virtual event, May 10–13, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12710, 512-542 (2021).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Round-optimal blind signatures in the plain model from classical and quantum standard assumptions. (English) Zbl 1479.94326

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12696, 404-434 (2021).
MSC:  94A62 94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Adaptively secure inner product encryption from LWE. (English) Zbl 1511.94118

Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12493, 375-404 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Adaptively secure constrained pseudorandom functions in the standard model. (English) Zbl 1501.94038

Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12170, 559-589 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fast, compact, and expressive attribute-based encryption. (English) Zbl 1500.94054

Kiayias, Aggelos (ed.) et al., Public-key cryptography – PKC 2020. 23rd IACR international conference on practice and theory of public-key cryptography, Edinburgh, UK, May 4–7, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12110, 3-33 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Compact NIZKs from standard assumptions on bilinear maps. (English) Zbl 07436951

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12107, 379-409 (2020).
MSC:  68P25 68Q15 94A60
PDFBibTeX XMLCite
Full Text: DOI

Exploring constructions of compact NIZKs from various assumptions. (English) Zbl 1509.94102

Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11694, 639-669 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Adaptively secure and succinct functional encryption: improving security and efficiency, simultaneously. (English) Zbl 1509.94103

Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11694, 521-551 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions. (English) Zbl 1509.94101

Ishai, Yuval (ed.) et al., Advances in cryptology – EUROCRYPT 2019. 38th annual international conference on the theory and applications of cryptographic techniques, Darmstadt, Germany, May 19–23, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11477, 622-651 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Adaptively single-key secure constrained PRFs for \(\text{NC}^1\). (English) Zbl 1509.94059

Lin, Dongdai (ed.) et al., Public-key cryptography – PKC 2019. 22nd IACR international conference on practice and theory of public-key cryptography, Beijing, China, April 14–17, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11443, 223-253 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio. (English) Zbl 1465.94084

Lin, Dongdai (ed.) et al., Public-key cryptography – PKC 2019. 22nd IACR international conference on practice and theory of public-key cryptography, Beijing, China, April 14–17, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11442, 466-495 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups. (English) Zbl 1436.94033

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10992, 543-574 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Obfustopia built on secret-key functional encryption. (English) Zbl 1428.94081

Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10821, 603-648 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Simple and generic constructions of succinct functional encryption. (English) Zbl 1420.94081

Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10770, 187-217 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Compact structure-preserving signatures with almost tight security. (English) Zbl 1410.94035

Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10402, 548-580 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Watermarking cryptographic programs. (English) Zbl 1410.94101

Phan, Raphael C.-W. (ed.) et al., Paradigms in cryptology – Mycrypt 2016. Malicious and exploratory cryptology. Second international conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1–2, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10311, 521-543 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Watermarking cryptographic capabilities. (English) Zbl 1377.94046

Wichs, Daniel (ed.) et al., Proceedings of the 48th annual ACM SIGACT symposium on theory of computing, STOC ’16, Cambridge, MA, USA, June 19–21, 2016. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-4132-5). 1115-1127 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

From cryptomania to obfustopia through secret-key functional encryption. (English) Zbl 1400.94122

Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016, Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-53643-8/pbk; 978-3-662-53644-5/ebook). Lecture Notes in Computer Science 9986, 391-418 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Anonymous traitor tracing: how to embed arbitrary information in a key. (English) Zbl 1371.94652

Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49895-8/pbk; 978-3-662-49896-5/ebook). Lecture Notes in Computer Science 9666, 388-419 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Generalizing efficient multiparty computation. (English) Zbl 1336.94042

Lehmann, Anja (ed.) et al., Information theoretic security. 8th international conference, ICITS 2015, Lugano, Switzerland, May 2–5, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17469-3/pbk; 978-3-319-17470-9/ebook). Lecture Notes in Computer Science 9063, 15-32 (2015).
PDFBibTeX XMLCite
Full Text: DOI

Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices. (English) Zbl 1335.94037

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 95-112 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

How to watermark cryptographic functions. (English) Zbl 1306.94081

Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 111-125 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES. (English) Zbl 1314.94105

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 405-422 (2013).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Tagged one-time signatures: tight security and optimal tag size. (English) Zbl 1314.94099

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 312-331 (2013).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Constant-size structure-preserving signatures: generic constructions and simple assumptions. (English) Zbl 1292.94016

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 4-24 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A multi-trapdoor commitment scheme from the RSA assumption. (English) Zbl 1323.94131

Steinfeld, Ron (ed.) et al., Information security and privacy. 15th Australasian conference, ACISP 2010, Sydney, Australia, July 5–7, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14080-8/pbk). Lecture Notes in Computer Science 6168, 182-199 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

CCA proxy re-encryption without bilinear maps in the standard model. (English) Zbl 1279.94100

Nguyen, Phong Q. (ed.) et al., Public key cryptography – PKC 2010. 13th international conference on practice and theory in public key cryptography, Paris, France, May 26–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13012-0/pbk). Lecture Notes in Computer Science 6056, 261-278 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the insecurity of the Fiat-Shamir signatures with iterative hash functions. (English) Zbl 1267.94118

Pieprzyk, Josef (ed.) et al., Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). Lecture Notes in Computer Science 5848, 118-128 (2009).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient non-interactive universally composable string-commitment schemes. (English) Zbl 1267.94128

Pieprzyk, Josef (ed.) et al., Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). Lecture Notes in Computer Science 5848, 3-18 (2009).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Security on hybrid encryption with the tag-KEM/DEM framework. (English) Zbl 1284.94094

Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 343-359 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Universally composable identity-based encryption. (English) Zbl 1295.94119

Nguyen, Phong Q. (ed.), Progress in cryptology – VIETCRYPT 2006. First international conference on cryptology in Vietnam, Hanoi, Vietnam, September 25–28, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-68799-3/pbk). Lecture Notes in Computer Science 4341, 337-353 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field

all top 3

Software