×

Found 36 Documents (Results 1–36)

Revocable hierarchical attribute-based signatures from lattices. (English) Zbl 1512.94111

Ateniese, Giuseppe (ed.) et al., Applied cryptography and network security. 20th international conference, ACNS 2022, Rome, Italy, June 20–23, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13269, 459-479 (2022).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Biometric-authenticated searchable encryption. (English) Zbl 07314384

Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12147, 40-61 (2020).
MSC:  68M25 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Hierarchical attribute-based signatures: short keys and optimal signature length. (English) Zbl 1458.94302

Deng, Robert H. (ed.) et al., Applied cryptography and network security. 17th international conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11464, 89-109 (2019).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Hierarchical attribute-based signatures. (English) Zbl 1518.94112

Camenisch, Jan (ed.) et al., Cryptology and network security. 17th international conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11124, 213-234 (2018).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Information security. 21st international conference, ISC 2018, Guildford, UK, September 9–12, 2018. Proceedings. (English) Zbl 1398.68020

Lecture Notes in Computer Science 11060. Cham: Springer (ISBN 978-3-319-99135-1/pbk; 978-3-319-99136-8/ebook). xi, 522 p. (2018).
MSC:  68-06 68P25 00B25
PDFBibTeX XMLCite
Full Text: DOI arXiv

Universally composable two-server PAKE. (English) Zbl 1397.68062

Bishop, Matt (ed.) et al., Information security. 19th international conference, ISC 2016, Honolulu, HI, USA, September 3–6, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-45870-0/pbk; 978-3-319-45871-7/ebook). Lecture Notes in Computer Science 9866, 147-166 (2016).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Blind password registration for two-server password authenticated key exchange and secret sharing protocols. (English) Zbl 1397.94079

Bishop, Matt (ed.) et al., Information security. 19th international conference, ISC 2016, Honolulu, HI, USA, September 3–6, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-45870-0/pbk; 978-3-319-45871-7/ebook). Lecture Notes in Computer Science 9866, 95-114 (2016).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19–22, 2016. Proceedings. (English) Zbl 1337.94004

Lecture Notes in Computer Science 9696. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). xiv, 668 p. (2016).
PDFBibTeX XMLCite
Full Text: DOI

Oblivious PAKE: efficient handling of password trials. (English) Zbl 1397.94080

Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 191-208 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Distributed smooth projective hashing and its application to two-server password authenticated key exchange. (English) Zbl 1353.94056

Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 199-216 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Relations among privacy notions for signcryption and key invisible “Sign-then-encrypt”. (English) Zbl 1316.94105

Boyd, Colin (ed.) et al., Information security and privacy. 18th Australasian conference, ACISP 2013, Brisbane, Australia, July 1–3, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39058-6/pbk). Lecture Notes in Computer Science 7959, 187-202 (2013).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Forward-secure hierarchical predicate encryption. (English) Zbl 1305.94051

Abdalla, Michel (ed.) et al., Pairing-based cryptography – Pairing 2012. 5th international conference, Cologne, Germany, May 16–18, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36333-7/pbk). Lecture Notes in Computer Science 7708, 83-101 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Cryptology and network security. 11th international conference, CANS 2012, Darmstadt, Germany, December 12–14, 2012. Proceedings. (English) Zbl 1295.68028

Lecture Notes in Computer Science 7712. Berlin: Springer (ISBN 978-3-642-35404-5/pbk). xvi, 311 p. (2012).
PDFBibTeX XMLCite

Publicly verifiable ciphertexts. (English) Zbl 1344.94047

Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 393-410 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Fully private revocable predicate encryption. (English) Zbl 1308.94074

Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 350-363 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Sufficient condition for ephemeral key-leakage resilient tripartite key exchange. (English) Zbl 1305.94047

Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 15-28 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. (English) Zbl 1241.94004

Lecture Notes in Computer Science 7293. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). xiv, 734 p. (2012).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Non-interactive and re-usable universally composable string commitments with adaptive security. (English) Zbl 1227.94044

Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 468-485 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Private discovery of common social contacts. (English) Zbl 1443.94054

Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7–10, 2011. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6715, 147-165 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Modeling leakage of ephemeral secrets in tripartite/group key exchange. (English) Zbl 1305.94063

Lee, Donghoon (ed.) et al., Information, security and cryptology – ICISC 2009. 12th international conference, Seoul, Korea, December 2–4, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14422-6/pbk). Lecture Notes in Computer Science 5984, 16-33 (2010).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Generic one round group key exchange in the standard model. (English) Zbl 1305.94052

Lee, Donghoon (ed.) et al., Information, security and cryptology – ICISC 2009. 12th international conference, Seoul, Korea, December 2–4, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14422-6/pbk). Lecture Notes in Computer Science 5984, 1-15 (2010).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Privacy-preserving group discovery with linear complexity. (English) Zbl 1443.94095

Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6123, 420-437 (2010).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Affiliation-hiding key exchange with untrusted group authorities. (English) Zbl 1443.94097

Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6123, 402-419 (2010).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Redactable signatures for tree-structured data: definitions and constructions. (English) Zbl 1315.94112

Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13707-5/pbk). Lecture Notes in Computer Science 6123, 87-104 (2010).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Confidential signatures and deterministic signcryption. (English) Zbl 1281.94078

Nguyen, Phong Q. (ed.) et al., Public key cryptography – PKC 2010. 13th international conference on practice and theory in public key cryptography, Paris, France, May 26–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13012-0/pbk). Lecture Notes in Computer Science 6056, 462-479 (2010).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Flexible group key exchange with on-demand computation of subgroup keys. (English) Zbl 1284.94049

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 351-368 (2010).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI Link

Public-key encryption with non-interactive opening: new constructions and stronger definitions. (English) Zbl 1284.94074

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 333-350 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fully robust tree-Diffie-Hellman group key exchange. (English) Zbl 1287.94058

Garay, Juan A. (ed.) et al., Cryptology and network security. 8th international conference, CANS 2009, Kanazawa, Japan, December 12–14, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10432-9/pbk). Lecture Notes in Computer Science 5888, 478-497 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Universally composable security analysis of TLS. (English) Zbl 1204.94068

Baek, Joonsang (ed.) et al., Provable security. Second international conference, ProvSec 2008, Shanghai, China, October 30–November 1, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88732-4/pbk). Lecture Notes in Computer Science 5324, 313-327 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Property-based attestation without a trusted third party. (English) Zbl 1181.94110

Wu, Tzong-Chen (ed.) et al., Information security. 11th international conference, ISC 2008, Taipei, Taiwan, September 15–18, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85884-3/pbk). Lecture Notes in Computer Science 5222, 31-46 (2008).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Enforcing user-aware browser-based mutual authentication with strong locked same origin policy. (English) Zbl 1279.94135

Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 6-20 (2008).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

A privacy-protecting multi-coupon scheme with stronger protection against splitting. (English) Zbl 1195.94051

Dietrich, Sven (ed.) et al., Financial cryptography and data security. 11th international conference, FC 2007, and 1st international workshop on usable security, USEC 2007, Scarborough, Trinidad and Tobago, February 12–16, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-77365-8/pbk). Lecture Notes in Computer Science 4886, 29-44 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field

Software