-
1
-
-
33745134401
-
-
Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John MaloneLee, Gregory Neven, Pascal Paillier, and Haixia Shi. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. In CRYPTO, pages 205-222, 2005.
-
Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John MaloneLee, Gregory Neven, Pascal Paillier, and Haixia Shi. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. In CRYPTO, pages 205-222, 2005.
-
-
-
-
2
-
-
24944516264
-
Tag-kem/dem: A new framework for hybrid encryption and new analysis of kurosawa-desmedt kern
-
Proceedings of Eurocrypt '05, Springer
-
M. Abe, R. Gennaro, K. Kurosawa, and V. Shoup. Tag-kem/dem: A new framework for hybrid encryption and new analysis of kurosawa-desmedt kern. In Proceedings of Eurocrypt '05, LNCS. Springer, 2005.
-
(2005)
LNCS
-
-
Abe, M.1
Gennaro, R.2
Kurosawa, K.3
Shoup, V.4
-
4
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Extended abstract in NDSS '05
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM TISSEC, 9(1), 2006. Extended abstract in NDSS '05.
-
(2006)
ACM TISSEC
, vol.9
, Issue.1
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
5
-
-
46749145666
-
Susan Hohenberger, and Breno de Medeiros. Practical group signatures without random oracles. Cryptology ePrint Archive
-
Report 2005/385
-
Giuseppe Ateniese, Jan Camenisch, Susan Hohenberger, and Breno de Medeiros. Practical group signatures without random oracles. Cryptology ePrint Archive, Report 2005/385, 2005.
-
(2005)
-
-
Ateniese, G.1
Camenisch, J.2
-
6
-
-
84954406641
-
Secret handshakes from pairing-based key agreements
-
Dirk Balfanz, Glenn Durfee, Narendar Shankar, Diana Smetters, Jessica Staddon, and Hao-Chi Wong. Secret handshakes from pairing-based key agreements. In proceedings of IEEE Symposium on Security and Privacy, 2003.
-
(2003)
proceedings of IEEE Symposium on Security and Privacy
-
-
Balfanz, D.1
Durfee, G.2
Shankar, N.3
Smetters, D.4
Staddon, J.5
Wong, H.-C.6
-
10
-
-
35248880074
-
Efficient threshold signature, multisignature and blind signature schemes based on the gap-Diffie-Hellman-group signature scheme
-
Proceedings of PKC 2003, of, Springer-Verlag
-
Alexandra Boldyreva. Efficient threshold signature, multisignature and blind signature schemes based on the gap-Diffie-Hellman-group signature scheme. In Proceedings of PKC 2003, volume 2567 of LNCS, pages 31-46. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2567
, pp. 31-46
-
-
Boldyreva, A.1
-
11
-
-
35048841300
-
Efficient selectiveID identity based encryption without random oracles
-
Proceedings of Eurocrypt 2004, of, Springer
-
D. Boneh and Xavier Boyen. Efficient selectiveID identity based encryption without random oracles. In Proceedings of Eurocrypt 2004, volume 3027 of LNCS, pages 223-38. Springer, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
12
-
-
35048887476
-
Short group signatures
-
Proceedings of Crypto 2004, August
-
D. Boneh, Xavier Boyen, and Hovav Shacham. Short group signatures. In Proceedings of Crypto 2004, LNCS, August 2004.
-
(2004)
LNCS
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
14
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
extended abstract in Crypto '01
-
D. Boneh and Matt Franklin. Identity-based encryption from the Weil pairing. SIAM Journal of Computing, 32(3):586-615, 2003. extended abstract in Crypto '01.
-
(2003)
SIAM Journal of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
15
-
-
43149116953
-
Space-efficient identity based encryption without pairings
-
D. Boneh, C. Gentry, and M. Hamburg. Space-efficient identity based encryption without pairings. In FOCS '07, 2007.
-
(2007)
FOCS '07
-
-
Boneh, D.1
Gentry, C.2
Hamburg, M.3
-
16
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
D. Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In Proceedings of Eurocrypt '03, pages 416-423, 2003.
-
(2003)
Proceedings of Eurocrypt '03
, pp. 416-423
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
17
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
D. Boneh, Craig Gentry, and Brent Waters. Collusion resistant broadcast encryption with short ciphertexts and private keys. In CRYPTO '05, pages 258-275, 2005.
-
(2005)
CRYPTO '05
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
18
-
-
33645998247
-
Hierarchical identity based encryption with constant size ciphertext
-
D. Boneh, E. Goh, and X. Boyen. Hierarchical identity based encryption with constant size ciphertext. In proceedings of Eurocrypt '05, 2005.
-
(2005)
proceedings of Eurocrypt '05
-
-
Boneh, D.1
Goh, E.2
Boyen, X.3
-
19
-
-
24144433396
-
Evaluating 2-dnf formulas on ciphertexts
-
Proceedings of Theory of Cryptography Conference 2005, of, Springer
-
D. Boneh, Eu-Jin Goh, and Kobbi Nissim. Evaluating 2-dnf formulas on ciphertexts. In Proceedings of Theory of Cryptography Conference 2005, volume 3378 of LNCS, pages 325-342. Springer, 2005.
-
(2005)
LNCS
, vol.3378
, pp. 325-342
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
20
-
-
23044435711
-
Short signatures from the Weil pairing
-
Extended abstract in Asiacrypt 2001
-
D. Boneh, Ben Lynn, and Hovav Shacham. Short signatures from the Weil pairing. J. of Cryptology, 17(4):297-319, 2004. Extended abstract in Asiacrypt 2001.
-
(2004)
J. of Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
21
-
-
33746096270
-
Fully collusion resistant traitor tracing with short ciphertexts and private keys
-
D. Boneh, Amit Sahai, and Brent Waters. Fully collusion resistant traitor tracing with short ciphertexts and private keys. In Proceedings of Eurocrypt '06, 2006.
-
(2006)
Proceedings of Eurocrypt '06
-
-
Boneh, D.1
Sahai, A.2
Waters, B.3
-
22
-
-
33745767987
-
Direct chosen ciphertext security from identity-based techniques
-
X. Boyen, Q. Mei, and B. Waters. Direct chosen ciphertext security from identity-based techniques. In proceedings of ACM CCS'05, pages 320-329, 2005.
-
(2005)
proceedings of ACM CCS'05
, pp. 320-329
-
-
Boyen, X.1
Mei, Q.2
Waters, B.3
-
23
-
-
33751053984
-
Anonymous hierarchical identity-based encryption (without random oracles)
-
Xavier Boyen and Brent Waters. Anonymous hierarchical identity-based encryption (without random oracles). In Crypto '06, 2006.
-
(2006)
Crypto '06
-
-
Boyen, X.1
Waters, B.2
-
25
-
-
24944577209
-
Signature schemes and anonymous credentials from bilinear maps
-
Jan Camenisch and Anna Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In proceedings of Crypto '04, 2004.
-
(2004)
proceedings of Crypto '04
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
26
-
-
35248897599
-
A forward-secure public-key encryption scheme
-
Proceedings of Eurocrypt 2003, of
-
Ran Canetti, Shai Halevi, and Jonathan Katz. A forward-secure public-key encryption scheme. In Proceedings of Eurocrypt 2003, volume 2656 of LNCS, 2003.
-
(2003)
LNCS
, vol.2656
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
27
-
-
35048852705
-
Chosenciphertext security from identity-based encryption
-
Proceedings of Eurocrypt 2004
-
Ran Canetti, Shai Halevi, and Jonathan Katz. Chosenciphertext security from identity-based encryption. In Proceedings of Eurocrypt 2004, LNCS, 2004.
-
(2004)
LNCS
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
29
-
-
85024261619
-
Signature schemes based on the strong RSA assumption
-
Extended abstract in Proc. 6th ACM CCS, 1999
-
Ronald Cramer and Victor Shoup. Signature schemes based on the strong RSA assumption. ACM TISSEC, 3(3): 161-185, 2000. Extended abstract in Proc. 6th ACM CCS, 1999.
-
(2000)
ACM TISSEC
, vol.3
, Issue.3
, pp. 161-185
-
-
Cramer, R.1
Shoup, V.2
-
30
-
-
46749093677
-
Searchable public-key encryption based on jacobi symbols
-
manuscript, Feb
-
Giovanni Di Crescenzo and Vishal Saraswat. Searchable public-key encryption based on jacobi symbols, manuscript, Feb. 2007.
-
(2007)
-
-
Di Crescenzo, G.1
Saraswat, V.2
-
31
-
-
33745140375
-
A verifiable random function with short proofs and keys
-
Yevgeniy Dodis and Aleksandr Yampolskiy. A verifiable random function with short proofs and keys. In Proceedings of PKC'05, 2005.
-
(2005)
Proceedings of PKC'05
-
-
Dodis, Y.1
Yampolskiy, A.2
-
32
-
-
84979291225
-
Broadcast encryption
-
Proceedings of Crypto '93, of, Springer-Verlag
-
A. Fiat and M. Naor. Broadcast encryption. In Proceedings of Crypto '93, volume 773 of LNCS, pages 480-491. Springer-Verlag, 1993.
-
(1993)
LNCS
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
33
-
-
84957661041
-
Secure hash-and-sign signatures without the random oracle
-
Proceedings of Eurocrypt 1999, Springer-Verlag
-
Rosario Gennaro, Shai Halevi, and Tal Rabin. Secure hash-and-sign signatures without the random oracle. In Proceedings of Eurocrypt 1999, LNCS, pages 123-139. Springer-Verlag, 1999.
-
(1999)
LNCS
, pp. 123-139
-
-
Gennaro, R.1
Halevi, S.2
Rabin, T.3
-
34
-
-
33746062799
-
Practical identity-based encryption without random oracles
-
Proceedings of Eurocrypt '06, of
-
Craig Gentry. Practical identity-based encryption without random oracles. In Proceedings of Eurocrypt '06, volume 4004 of LNCS, pages 445-464, 2006.
-
(2006)
LNCS
, vol.4004
, pp. 445-464
-
-
Gentry, C.1
-
36
-
-
46749101284
-
-
Jens Groth, Rafail Ostrovsky, and Amit Sahai. Noninteractive zaps and new techniques for NIZK. In Proceedings of Crypto '06, 2006.
-
Jens Groth, Rafail Ostrovsky, and Amit Sahai. Noninteractive zaps and new techniques for NIZK. In Proceedings of Crypto '06, 2006.
-
-
-
-
38
-
-
23944461491
-
A one round protocol for tripartite Diffie-Hellman
-
extended abstract in ANTS 2000
-
Antoine Joux. A one round protocol for tripartite Diffie-Hellman. J. of Cryptology, 17(4):263-276, 2004. extended abstract in ANTS 2000.
-
(2004)
J. of Cryptology
, vol.17
, Issue.4
, pp. 263-276
-
-
Joux, A.1
-
39
-
-
21144454271
-
Separating decision Diffie-Hellman from Diffie-Hellman in cryptographic groups
-
extended abstract in ePrint report 2001/003
-
Antoine Joux and Kim Nguyen. Separating decision Diffie-Hellman from Diffie-Hellman in cryptographic groups. J. of Cryptology, 16(4):239-247, 2003. extended abstract in ePrint report 2001/003.
-
(2003)
J. of Cryptology
, vol.16
, Issue.4
, pp. 239-247
-
-
Joux, A.1
Nguyen, K.2
-
40
-
-
26444461469
-
Append-only signatures
-
E. Kiltz, A. Mityagin, S. Panjwani, and B. Raghavan. Append-only signatures. In Proceedings of ICALP '05, pages 434-445, 2005.
-
(2005)
Proceedings of ICALP '05
, pp. 434-445
-
-
Kiltz, E.1
Mityagin, A.2
Panjwani, S.3
Raghavan, B.4
-
41
-
-
33745574075
-
Chosen-ciphertext security from tag-based encryption
-
Eike Kiltz. Chosen-ciphertext security from tag-based encryption. In Proceedings of TCC'06, pages 581-600, 2006.
-
(2006)
Proceedings of TCC'06
, pp. 581-600
-
-
Kiltz, E.1
-
42
-
-
0031378815
-
Replication is not needed: Single database, computationally-private information retrieval
-
Eyal Kushilevitz and Rafail Ostrovsky. Replication is not needed: Single database, computationally-private information retrieval. In FOCS '97, pages 364-373, 1997.
-
(1997)
FOCS '97
, pp. 364-373
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
43
-
-
18744387712
-
Oblivious signature-based envelope
-
selected paper from PODC '03
-
Ninghui Li, Wenliang Du, and D. Boneh. Oblivious signature-based envelope. Distributed Computing, 17(4):293-302, 2005. selected paper from PODC '03.
-
(2005)
Distributed Computing
, vol.17
, Issue.4
, pp. 293-302
-
-
Li, N.1
Du, W.2
Boneh, D.3
-
44
-
-
65349133168
-
Sequential aggregate signatures and multisignatures without random oracles
-
Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, and Brent Waters. Sequential aggregate signatures and multisignatures without random oracles. In Proceeding of Eurocrypt 2006, 2006.
-
(2006)
Proceeding of Eurocrypt 2006
-
-
Lu, S.1
Ostrovsky, R.2
Sahai, A.3
Shacham, H.4
Waters, B.5
-
46
-
-
84937425161
-
Unique signatures and verifiable random functions from DH-DDH separation
-
A. Lysyanskaya. Unique signatures and verifiable random functions from DH-DDH separation. In Proceedings of Crypto '02, pages 597-612, 2002.
-
(2002)
Proceedings of Crypto '02
, pp. 597-612
-
-
Lysyanskaya, A.1
-
47
-
-
84947597805
-
Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms
-
U. Maurer. Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms. In Proceedings of Crypto'94, pages 271-281, 1994.
-
(1994)
Proceedings of Crypto'94
, pp. 271-281
-
-
Maurer, U.1
-
48
-
-
0027662341
-
Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field
-
Alfred Menezes, Tatsuaki Okamoto, and Paul Vanstone. Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field. IEEETIT: IEEE Transactions on Information Theory, 39(5): 1639-1646, 1993.
-
(1993)
IEEETIT: IEEE Transactions on Information Theory
, vol.39
, Issue.5
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, P.3
-
50
-
-
22144445920
-
The weil pairing, and its efficient calculation
-
235-261, extended abstract written in, but never published
-
Victor Miller. The weil pairing, and its efficient calculation. J. of Cryptology, 17(4):235-261, 2004. extended abstract written in 1986, but never published.
-
(1986)
J. of Cryptology
, vol.17
, Issue.4
-
-
Miller, V.1
-
51
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
Proceedings of Crypto '01, of
-
D. Naor, M. Naor, and J. Lotspiech. Revocation and tracing schemes for stateless receivers. In Proceedings of Crypto '01, volume 2139 of LNCS, pages 41-62, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
54
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Advances in Cryptology-CRYPTO 1984, of, Springer-Verlag
-
Adi Shamir. Identity-based cryptosystems and signature schemes. In Advances in Cryptology-CRYPTO 1984, volume 196 of LNCS, pages 47-53. Springer-Verlag, 1984.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
55
-
-
0003357475
-
The Arithmetic of Elliptic Curves
-
of, Springer-Verlag
-
Joseph H. Silverman. The Arithmetic of Elliptic Curves, volume 106 of Graduate Texts in Mathematics. Springer-Verlag, 1986.
-
(1986)
Graduate Texts in Mathematics
, vol.106
-
-
Silverman, J.H.1
-
56
-
-
24944590176
-
Efficient identity-based encryption without random oracles
-
Springer
-
Brent Waters. Efficient identity-based encryption without random oracles. In Proceedings of Eurocrypt 2005. Springer, 2005.
-
(2005)
Proceedings of Eurocrypt 2005
-
-
Waters, B.1
|