-
1
-
-
51849127804
-
Deterministic encryption: Definitional equivalences and constructions without random oracles
-
Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
-
Bellare, M., Fischlin, M., O'Neill, A., Ristenpart, T.: Deterministic encryption: Definitional equivalences and constructions without random oracles. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 360-378. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 360-378
-
-
Bellare, M.1
Fischlin, M.2
O'Neill, A.3
Ristenpart, T.4
-
2
-
-
38149068986
-
Deterministic and efficiently searchable encryption
-
Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
-
Bellare, M., Boldyreva, A., O'Neill, A.: Deterministic and efficiently searchable encryption. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 535-552. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 535-552
-
-
Bellare, M.1
Boldyreva, A.2
O'Neill, A.3
-
3
-
-
33745854208
-
Chosen-ciphertext security from identity-based encryption
-
Boneh, D., Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. SIAM J. Comput. 36(5), 1301-1328 (2006)
-
(2006)
SIAM J. Comput
, vol.36
, Issue.5
, pp. 1301-1328
-
-
Boneh, D.1
Canetti, R.2
Halevi, S.3
Katz, J.4
-
4
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
5
-
-
57949110320
-
On the impossibility of basing identity based encryption on trapdoor permutations
-
Washington, DC, USA, pp, IEEE Computer Society, Los Alamitos
-
Boneh, D., Papakonstantinou, P., Rackoff, C., Vahlis, Y., Waters, B.: On the impossibility of basing identity based encryption on trapdoor permutations. In: FOCS 2008: Proceedings of the 2008 49th Annual IEEE Symposium on Foundations of Computer Science, Washington, DC, USA, pp. 283-292. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
FOCS 2008: Proceedings of the 2008 49th Annual IEEE Symposium on Foundations of Computer Science
, pp. 283-292
-
-
Boneh, D.1
Papakonstantinou, P.2
Rackoff, C.3
Vahlis, Y.4
Waters, B.5
-
6
-
-
0033723965
-
Resettable zero-knowledge (extended abstract)
-
ACM, New York
-
Canetti, R., Goldreich, O., Goldwasser, S., Micali, S.: Resettable zero-knowledge (extended abstract). In: STOC 2000: Proceedings of the thirty-second annual ACM symposium on Theory of computing, pp. 235-244. ACM, New York (2000)
-
(2000)
STOC 2000: Proceedings of the thirty-second annual ACM symposium on Theory of computing
, pp. 235-244
-
-
Canetti, R.1
Goldreich, O.2
Goldwasser, S.3
Micali, S.4
-
8
-
-
85028450627
-
Non-malleable cryptography
-
ACM, New York
-
Dolev, D., Dwork, C., Naor, M.: Non-malleable cryptography. In: STOC 1991: Proceedings of the twenty-third annual ACM symposium on Theory of computing, pp. 542-552. ACM, New York (1991)
-
(1991)
STOC 1991: Proceedings of the twenty-third annual ACM symposium on Theory of computing
, pp. 542-552
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
9
-
-
1642502421
-
Nonmalleable cryptography
-
Dolev, D., Dwork, C., Naor, M.: Nonmalleable cryptography. SIAM Review 45(4), 727-784 (2003)
-
(2003)
SIAM Review
, vol.45
, Issue.4
, pp. 727-784
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
10
-
-
33644600483
-
Bounds on the efficiency of generic cryptographic constructions
-
Gennaro, R., Gertner, Y., Katz, J., Trevisan, L.: Bounds on the efficiency of generic cryptographic constructions. SIAM J. Comput. 35(1), 217-246 (2005)
-
(2005)
SIAM J. Comput
, vol.35
, Issue.1
, pp. 217-246
-
-
Gennaro, R.1
Gertner, Y.2
Katz, J.3
Trevisan, L.4
-
11
-
-
0034497243
-
The relationship between public key encryption and oblivious transfer
-
Washington, DC, USA, p, IEEE Computer Society, Los Alamitos
-
Gertner, Y., Kannan, S., Malkin, T., Reingold, O., Viswanathan, M.: The relationship between public key encryption and oblivious transfer. In: FOCS 2000: Proceedings of the 41st Annual Symposium on Foundations of Computer Science, Washington, DC, USA, p. 325. IEEE Computer Society, Los Alamitos (2000)
-
(2000)
FOCS 2000: Proceedings of the 41st Annual Symposium on Foundations of Computer Science
, pp. 325
-
-
Gertner, Y.1
Kannan, S.2
Malkin, T.3
Reingold, O.4
Viswanathan, M.5
-
12
-
-
0035172306
-
On the impossibility of basing trapdoor functions on trapdoor predicates
-
Washington, DC, USA, p, IEEE Computer Society, Los Alamitos
-
Gertner, Y., Malkin, T., Reingold, O.: On the impossibility of basing trapdoor functions on trapdoor predicates. In: FOCS 2001: Proceedings of the 42nd IEEE symposium on Foundations of Computer Science, Washington, DC, USA, p. 126. IEEE Computer Society, Los Alamitos (2001)
-
(2001)
FOCS 2001: Proceedings of the 42nd IEEE symposium on Foundations of Computer Science
, pp. 126
-
-
Gertner, Y.1
Malkin, T.2
Reingold, O.3
-
13
-
-
38049069658
-
-
Gertner, Y., Malkin, T., Myers, S.: Towards a separation of semantic and CCA security for public key encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 434-455. Springer, Heidelberg (2007)
-
Gertner, Y., Malkin, T., Myers, S.: Towards a separation of semantic and CCA security for public key encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 434-455. Springer, Heidelberg (2007)
-
-
-
-
14
-
-
38049069658
-
-
Gertner, Y., Malkin, T., Myers, S.: Towards a separation of semantic and CCA security for public key encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 434-455. Springer, Heidelberg (2007)
-
Gertner, Y., Malkin, T., Myers, S.: Towards a separation of semantic and CCA security for public key encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 434-455. Springer, Heidelberg (2007)
-
-
-
-
16
-
-
35048815001
-
-
Reingold, O., Trevisan, L., Vadhan, S.P.: Notions of reducibility between cryptographic primitives. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 1-20. Springer, Heidelberg (2004)
-
Reingold, O., Trevisan, L., Vadhan, S.P.: Notions of reducibility between cryptographic primitives. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 1-20. Springer, Heidelberg (2004)
-
-
-
-
17
-
-
67650674979
-
-
Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009. LNCS, 5444, pp. 419-436. Springer, Heidelberg (2009)
-
Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 419-436. Springer, Heidelberg (2009)
-
-
-
-
18
-
-
84957690790
-
Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?
-
Nyberg, K, ed, EUROCRYPT 1998, Springer, Heidelberg
-
Simon, D.R.: Finding collisions on a one-way street: Can secure hash functions be based on general assumptions? In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 334-345. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 334-345
-
-
Simon, D.R.1
|