×

Found 47 Documents (Results 1–47)

SNACKs: leveraging proofs of sequential work for blockchain light clients. (English) Zbl 1519.94024

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13791, 806-836 (2023).
MSC:  94A60 91B99
PDFBibTeX XMLCite
Full Text: DOI

Non-interactive Mimblewimble transactions, revisited. (English) Zbl 1519.91293

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13791, 713-744 (2023).
MSC:  91G99 94A60
PDFBibTeX XMLCite
Full Text: DOI

Approximate distance-comparison-preserving symmetric encryption. (English) Zbl 1518.94062

Galdi, Clemente (ed.) et al., Security and cryptography for networks. 13th International conference, SCN 2022, Amalfi (SA), Italy, September 12–14, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13409, 117-144 (2022).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

The one-more discrete logarithm assumption in the generic group model. (English) Zbl 1514.94146

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 13093, 587-617 (2021).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Transferable e-cash: a cleaner model and the first practical instantiation. (English) Zbl 1479.94123

Garay, Juan A. (ed.), Public-key cryptography – PKC 2021. 24th IACR international conference on practice and theory of public key cryptography, virtual event, May 10–13, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12711, 559-590 (2021).
MSC:  94A60 91B64
PDFBibTeX XMLCite
Full Text: DOI

Efficient signatures on randomizable ciphertexts. (English) Zbl 1506.94074

Galdi, Clemente (ed.) et al., Security and cryptography for networks. 12th international conference, SCN 2020, Amalfi, Italy, September 14–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12238, 359-381 (2020).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Double-authentication-preventing signatures in the standard model. (English) Zbl 1506.94076

Galdi, Clemente (ed.) et al., Security and cryptography for networks. 12th international conference, SCN 2020, Amalfi, Italy, September 14–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12238, 338-358 (2020).
MSC:  94A62 94A60 91B64
PDFBibTeX XMLCite
Full Text: DOI

A classification of computational assumptions in the algebraic group model. (English) Zbl 1504.94101

Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12171, 121-151 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Simpler constructions of asymmetric primitives from obfuscation. (English) Zbl 1492.94104

Bhargavan, Karthikeyan (ed.) et al., Progress in cryptology – INDOCRYPT 2020. 21st international conference on cryptology in India, Bangalore, India, December 13–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12578, 715-738 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model. (English) Zbl 1492.94187

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 63-95 (2020).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Adaptively secure proxy re-encryption. (English) Zbl 1509.94087

Lin, Dongdai (ed.) et al., Public-key cryptography – PKC 2019. 22nd IACR international conference on practice and theory of public-key cryptography, Beijing, China, April 14–17, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11443, 317-346 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The algebraic group model and its applications. (English) Zbl 1430.94068

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10992, 33-62 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Weakly secure equivalence-class signatures from standard assumptions. (English) Zbl 1412.94174

Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10770, 153-183 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Subversion-zero-knowledge SNARKs. (English) Zbl 1385.94036

Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-76577-8/pbk; 978-3-319-76578-5/ebook). Lecture Notes in Computer Science 10769, 315-347 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Access control encryption for equality, comparison, and more. (English) Zbl 1400.94144

Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-54387-0/pbk; 978-3-662-54388-7/ebook). Lecture Notes in Computer Science 10175, 88-118 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

NIZKs with an untrusted CRS: security in the face of parameter subversion. (English) Zbl 1407.94082

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 777-804 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical round-optimal blind signatures in the standard model from weaker assumptions. (English) Zbl 1482.94067

Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9841, 391-408 (2016).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Constrained PRFs for unbounded inputs with short keys. (English) Zbl 1348.94028

Manulis, Mark (ed.) et al., Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19–22, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). Lecture Notes in Computer Science 9696, 445-463 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Offline witness encryption. (English) Zbl 1348.94029

Manulis, Mark (ed.) et al., Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19–22, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). Lecture Notes in Computer Science 9696, 285-303 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Constrained PRFs for unbounded inputs. (English) Zbl 1334.94053

Sako, Kazue (ed.), Topics in cryptology – CT-RSA 2016. The cryptographers’ track at the RSA conference 2016, San Francisco, CA, USA, February 29 – March 4, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-29484-1/pbk; 978-3-319-29485-8/ebook). Lecture Notes in Computer Science 9610, 413-428 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Standard security does imply security against selective opening for Markov distributions. (English) Zbl 1348.94046

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 282-305 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A quasipolynomial reduction for generalized selective decryption on trees. (English) Zbl 1375.94125

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 601-620 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical round-optimal blind signatures in the standard model. (English) Zbl 1351.94045

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 233-253 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Anonymous transferable e-cash. (English) Zbl 1345.94034

Katz, Jonathan (ed.), Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 101-124 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Key-homomorphic constrained pseudorandom functions. (English) Zbl 1315.94052

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 31-60 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Adaptive security of constrained PRFs. (English) Zbl 1317.94107

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014, Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). Lecture Notes in Computer Science 8874, 82-101 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Constrained verifiable random functions. (English) Zbl 1302.94047

Abdalla, Michel (ed.) et al., Security and cryptography for networks. 9th international conference, SCN 2014, Amalfi, Italy, September 3–5, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-10878-0/pbk). Lecture Notes in Computer Science 8642, 95-114 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Policy-based signatures. (English) Zbl 1335.94031

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 520-537 (2014).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Enhanced chosen-ciphertext security and applications. (English) Zbl 1335.94044

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 329-344 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient signatures of knowledge and DAA in the standard model. (English) Zbl 1416.94042

Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25–28, 2013. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 7954, 518-533 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Plaintext-checkable encryption. (English) Zbl 1292.94043

Dunkelman, Orr (ed.), Topics in cryptology – CT-RSA 2012. The cryptographers’ track at the RSA conference 2012, San Francisco, CA, USA, February 27–March 2, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27953-9/pbk). Lecture Notes in Computer Science 7178, 332-348 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Achieving optimal anonymity in transferable e-cash with a judge. (English) Zbl 1280.94105

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2011. 4th international conference on cryptology in Africa, Dakar, Senegal, July 5–7, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21968-9/pbk). Lecture Notes in Computer Science 6737, 206-223 (2011).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Commuting signatures and verifiable encryption. (English) Zbl 1281.94079

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 224-245 (2011).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Signatures on randomizable ciphertexts. (English) Zbl 1291.94180

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 403-422 (2011).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Structure-preserving signatures and commitments to group elements. (English) Zbl 1280.94102

Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 209-236 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Batch Groth-Sahai. (English) Zbl 1315.94061

Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13707-5/pbk). Lecture Notes in Computer Science 6123, 218-235 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Public-key encryption with non-interactive opening: new constructions and stronger definitions. (English) Zbl 1284.94074

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 333-350 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Strong cryptography from weak secrets. Building efficient PKE and IBE from distributed passwords. (English) Zbl 1284.94056

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 297-315 (2010).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Fair blind signatures without random oracles. (English) Zbl 1284.94136

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 16-33 (2010).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient rational secret sharing in standard communication networks. (English) Zbl 1274.94137

Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 419-436 (2010).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: DOI

Proofs on encrypted values in bilinear groups and an application to anonymity of signatures. (English) Zbl 1248.94104

Shacham, Hovav (ed.) et al., Pairing-based cryptography – Pairing 2009. Third international conference Palo Alto, CA, USA, August 12–14, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03297-4/pbk). Lecture Notes in Computer Science 5671, 132-149 (2009).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Anonymous consecutive delegation of signing rights: unifying group and proxy signatures. (English) Zbl 1242.94035

Cortier, Véronique (ed.) et al., Formal to practical security. Papers issued from the 2005–2008 French-Japanese collaboration. Berlin: Springer (ISBN 978-3-642-02001-8/pbk). Lecture Notes in Computer Science 5458, 95-115 (2009).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Anonymous proxy signatures. (English) Zbl 1180.94071

Ostrovsky, Rafail (ed.) et al., Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85854-6/pbk). Lecture Notes in Computer Science 5229, 201-217 (2008).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field

all top 3

Software