-
1
-
-
38049032820
-
How to shuffle in public
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Adida, B., Wikstrom, D.: How to shuffle in public. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 555-574. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 555-574
-
-
Adida, B.1
Wikstrom, D.2
-
2
-
-
84947237328
-
On the Security of Joint Signature and Encryption
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
-
An, J.H., Dodis, Y., Rabin, T.: On the Security of Joint Signature and Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 83-107. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
3
-
-
79251578513
-
On the (Im)possibility of Obfuscating Programs
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg ECCC, Report No. 57
-
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (Im)possibility of Obfuscating Programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1-18. Springer, Heidelberg (2001); ECCC, Report No. 57
-
(2001)
LNCS
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
5
-
-
35048887476
-
Short Group Signatures
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
6
-
-
0037623983
-
Identity based encryption from the Weil pairing
-
Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. SIAM J. of Computing 32(3), 586-615 (2003)
-
(2003)
SIAM J. of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
84946840347
-
Short Signatures from the Weil Pairing
-
Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
-
Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514-532. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
8
-
-
0842305659
-
Towards Realizing Random Oracles: Hash Functions that Hide All Partial Information
-
Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg
-
Canetti, R.: Towards Realizing Random Oracles: Hash Functions that Hide All Partial Information. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 455-469. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 455-469
-
-
Canetti, R.1
-
9
-
-
44449095554
-
Obfuscating point functions with multibit output
-
DOI 10.1007/978-3-540-78967-3-28, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Canetti, R., Dakdouk, R.R.: Obfuscating Point Functions with Multibit Output. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 489-508. Springer, Heidelberg (2008) (Pubitemid 351762846)
-
(2008)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965 LNCS
, pp. 489-508
-
-
Canetti, R.1
Dakdouk, R.R.2
-
10
-
-
35248875326
-
Relaxing Chosen-Ciphertext Security
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Canetti, R., Krawczyk, H., Nielsen, J.B.: Relaxing Chosen-Ciphertext Security. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 565-582. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 565-582
-
-
Canetti, R.1
Krawczyk, H.2
Nielsen, J.B.3
-
12
-
-
70350657206
-
Non-malleable Obfuscation
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Canetti, R., Varia, M.: Non-malleable Obfuscation. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 73-90. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 73-90
-
-
Canetti, R.1
Varia, M.2
-
13
-
-
0010252194
-
Undeniable Signatures
-
Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
-
Chaum, D., van Antwerpen, H.: Undeniable Signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 212-216. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 212-216
-
-
Chaum, D.1
Van Antwerpen, H.2
-
14
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing 33(11), 167-226 (2003)
-
(2003)
SIAM Journal on Computing
, vol.33
, Issue.11
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
15
-
-
84958742006
-
Efficient Construction of (Distributed) Verifiable Random Functions
-
Naccache, D., Paillier, P. (eds.) PKC 2002. Springer, Heidelberg
-
Dodis, Y.: Efficient Construction of (Distributed) Verifiable Random Functions. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 1-17. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2274
, pp. 1-17
-
-
Dodis, Y.1
-
17
-
-
84874800178
-
A public key cryptosystem and signature scheme based on discrete logarithms
-
ElGamal, T.: A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory 31, 469-472 (1985)
-
(1985)
IEEE Trans. Inform. Theory
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
20
-
-
33748600953
-
On the Impossibility of Obfuscation with Auxiliary Input
-
Goldwasser, S., Kalai, Y.T.: On the Impossibility of Obfuscation with Auxiliary Input. In: Proceedings of FOCS 2005, pp. 553-562 (2005)
-
(2005)
Proceedings of FOCS 2005
, pp. 553-562
-
-
Goldwasser, S.1
Kalai, Y.T.2
-
21
-
-
38049015775
-
On Best-Possible Obfuscation
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Goldwasser, S., Rothblum, G.N.: On Best-Possible Obfuscation. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 194-213. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 194-213
-
-
Goldwasser, S.1
Rothblum, G.N.2
-
22
-
-
84937414062
-
Zero-Knowledge and Code Obfuscation
-
Okamoto, T. (ed.) ASIACRYPT 2000. Springer, Heidelberg
-
Hada, S.: Zero-Knowledge and Code Obfuscation. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 443-457. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 443-457
-
-
Hada, S.1
-
23
-
-
38049056625
-
Obfuscation for Cryptographic Purposes
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Hofheinz, D., Malone-Lee, J., Stam, M.: Obfuscation for Cryptographic Purposes. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 214-232. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 214-232
-
-
Hofheinz, D.1
Malone-Lee, J.2
Stam, M.3
-
24
-
-
38049073133
-
Securely Obfuscating Re-Encryption
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Hohenberger, S., Rothblum, G.N., Shelat, A., Vaikuntanathan, V.: Securely Obfuscating Re-Encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 233-252. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 233-252
-
-
Hohenberger, S.1
Rothblum, G.N.2
Shelat, A.3
Vaikuntanathan, V.4
-
25
-
-
84958550160
-
The Weil and Tate pairings as building blocks for public key cryptosystems
-
Fieker, C., Kohel, D.R. (eds.) ANTS 2002. Springer, Heidelberg
-
Joux, A.: The Weil and Tate pairings as building blocks for public key cryptosystems. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 20-32. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2369
, pp. 20-32
-
-
Joux, A.1
-
26
-
-
21144454271
-
Separating decision diffie-hellman from computational diffie-hellman in cryptographic groups
-
DOI 10.1007/s00145-003-0052-4
-
Joux, A., Nguyen, K.: Separating Decision Diffie-Hellman from Diffie-Hellman in Cryptographic Groups. Journal of Cryptology 16(4), 239-247 (2003) (Pubitemid 40877275)
-
(2003)
Journal of Cryptology
, vol.16
, Issue.4
, pp. 239-247
-
-
Joux, A.1
Nguyen, K.2
-
27
-
-
35048895442
-
Positive Results and Techniques for Obfuscation
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Lynn, B., Prabhakaran, M., Sahai, A.: Positive Results and Techniques for Obfuscation. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 20-39. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 20-39
-
-
Lynn, B.1
Prabhakaran, M.2
Sahai, A.3
-
28
-
-
84937425161
-
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation
-
Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
-
Lysyanskaya, A.: Unique Signatures and Verifiable Random Functions from the DH-DDH Separation. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, p. 597. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 597
-
-
Lysyanskaya, A.1
-
29
-
-
4243054954
-
Number-Theoretic Constructions of Efficient Pseudo-Random Functions
-
Naor, M., Reingold, O.: Number-Theoretic Constructions of Efficient Pseudo-Random Functions. Journal of the ACM 51(2), 231-262 (2004)
-
(2004)
Journal of the ACM
, vol.51
, Issue.2
, pp. 231-262
-
-
Naor, M.1
Reingold, O.2
-
30
-
-
33745177806
-
Private searching on streaming data
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Ostrovsky, R., Skeith III, W.E.: Private searching on streaming data. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 223-240. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 223-240
-
-
Ostrovsky, R.1
Skeith III, W.E.2
-
31
-
-
84942550998
-
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
32
-
-
12344258539
-
Efficient Signature Generation by Smart Cards
-
Schnorr, C.P.: Efficient Signature Generation by Smart Cards. Journal of Cryptology 4(3), 161-174 (1991)
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
33
-
-
24944566040
-
Efficient Identity-Based Encryption Without Random Oracles
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Waters, B.: Efficient Identity-Based Encryption Without Random Oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
34
-
-
33745541383
-
On Obfuscating Point Functions
-
Wee, H.: On Obfuscating Point Functions. In: Proceedings of STOC 2005, pp. 523-532 (2005)
-
(2005)
Proceedings of STOC 2005
, pp. 523-532
-
-
Wee, H.1
-
35
-
-
63449122349
-
Digital Signcryption or How to Achieve Cost (Signature & Encryption) ≪ Cost (Signature) + Cost (Encryption)
-
Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
-
Zheng, Y.: Digital Signcryption or How to Achieve Cost (Signature & Encryption) ≪ Cost (Signature) + Cost (Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165-179. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
|