-
1
-
-
69949124606
-
Randomizable Proofs and Delegatable Anonymous Credentials
-
Halevi, S. (ed.), Springer, Heidelberg, CRYPTO 2009
-
Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., Shacham, H.: Randomizable Proofs and Delegatable Anonymous Credentials. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol.5677, pp. 108-125. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 108-125
-
-
Belenkiy, M.1
Camenisch, J.2
Chase, M.3
Kohlweiss, M.4
Lysyanskaya, A.5
Shacham, H.6
-
2
-
-
20544449100
-
The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme
-
Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme. Journal of Cryptology 16(3), 185-215 (2008)
-
(2008)
Journal of Cryptology
, vol.16
, Issue.3
, pp. 185-215
-
-
Bellare, M.1
Namprempre, C.2
Pointcheval, D.3
Semanko, M.4
-
3
-
-
35048901123
-
Public key Encryption with Keyword Search
-
Cachin, C., Camenisch, J.L. (eds.), Springer, Heidelberg, EUROCRYPT 2004
-
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 506-522. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
4
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. SIAM Journal of Computing 32(3), 586-615 (2003)
-
(2003)
SIAM Journal of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.K.2
-
5
-
-
33749573228
-
Anonymous hierarchical identity-based encryption (Without Random Oracles)
-
Dwork, C. (ed.), Springer, Heidelberg, CRYPTO 2006
-
Boyen, X., Waters, B.: Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.4117, pp. 290-307. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 290-307
-
-
Boyen, X.1
Waters, B.2
-
6
-
-
67049154037
-
Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data
-
Jarecki, S., Tsudik, G. (eds.), Springer, Heidelberg, PKC 2009
-
Camenisch, J., Kohlweiss, M., Rial, A., Sheedy, C.: Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol.5443, pp. 196-214. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5443
, pp. 196-214
-
-
Camenisch, J.1
Kohlweiss, M.2
Rial, A.3
Sheedy, C.4
-
7
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
Boneh, D. (ed.), Springer, Heidelberg, CRYPTO 2003
-
Camenisch, J., Shoup, V.: Practical verifiable encryption and decryption of discrete logarithms. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.2729, pp. 126-144. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 126-144
-
-
Camenisch, J.1
Shoup, V.2
-
9
-
-
68949136946
-
Efficient Robust Private Set Intersection
-
Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.), Springer, Heidelberg, ACNS 2009
-
Dachman-Soled, D., Malkin, T., Raykova, M., Yung, M.: Efficient Robust Private Set Intersection. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol.5536, pp. 125-142. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5536
, pp. 125-142
-
-
Dachman-Soled, D.1
Malkin, T.2
Raykova, M.3
Yung, M.4
-
11
-
-
69949150672
-
Privacy-preserving policy-based information transfer
-
Goldberg, I., Atallah, M.J. (eds.), Springer, Heidelberg, Privacy Enhancing Technologies
-
De Cristofaro, E., Jarecki, S., Kim, J., Tsudik, G.: Privacy-Preserving Policy-Based Information Transfer. In: Goldberg, I., Atallah, M.J. (eds.) Privacy Enhancing Technologies. LNCS, vol.5672, pp. 164-184. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5672
, pp. 164-184
-
-
De Cristofaro, E.1
Jarecki, S.2
Kim, J.3
Tsudik, G.4
-
13
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: PODS 2003, pp. 211-222 (2003)
-
(2003)
PODS 2003
, pp. 211-222
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
14
-
-
24144488603
-
Keyword search and oblivious pseudorandom functions
-
Kilian, J. (ed.), Springer, Heidelberg, TCC 2005
-
Freedman, M., Ishai, Y., Pinkas, B., Reingold, O.: Keyword search and oblivious pseudorandom functions. In: Kilian, J. (ed.) TCC 2005. LNCS, vol.3378, pp. 303-324. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3378
, pp. 303-324
-
-
Freedman, M.1
Ishai, Y.2
Pinkas, B.3
Reingold, O.4
-
15
-
-
35048820609
-
Efficient private matching and set intersection
-
Cachin, C., Camenisch, J.L. (eds.), Springer, Heidelberg, EUROCRYPT 2004
-
Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 1-19. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
16
-
-
40249108370
-
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
-
Canetti, R. (ed.), Springer, Heidelberg, TCC 2008
-
Hazay, C., Lindell, Y.: Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol.4948, pp. 155-175. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 155-175
-
-
Hazay, C.1
Lindell, Y.2
-
17
-
-
84883891962
-
Enhancing privacy and trust in electronic communities
-
Huberman, B., Franklin, M., Hogg, T.: Enhancing privacy and trust in electronic communities. In: ACM Conference on Electronic Commerce, pp. 78-86 (1999)
-
(1999)
ACM Conference on Electronic Commerce
, pp. 78-86
-
-
Huberman, B.1
Franklin, M.2
Hogg, T.3
-
18
-
-
70350656283
-
Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection
-
Reingold, O. (ed.), Springer, Heidelberg, TCC 2009
-
Jarecki, S., Liu, X.: Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. In: Reingold, O. (ed.) TCC 2009. LNCS, vol.5444, pp. 577-594. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 577-594
-
-
Jarecki, S.1
Liu, X.2
-
20
-
-
33745160750
-
Privacy-preserving set operations
-
Shoup, V. (ed.), Springer, Heidelberg, CRYPTO 2005
-
Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.3621, pp. 241-257. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 241-257
-
-
Kissner, L.1
Song, D.2
-
21
-
-
1942420748
-
Oblivious keyword search
-
Ogata, W., Kurosawa, K.: Oblivious keyword search. Journal of Complexity 20(2-3), 356-371 (2004)
-
(2004)
Journal of Complexity
, vol.20
, Issue.2-3
, pp. 356-371
-
-
Ogata, W.1
Kurosawa, K.2
-
22
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J. (ed.), Springer, Heidelberg, EUROCRYPT 1999
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
23
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120-126 (1978)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
24
-
-
12344258539
-
Efficient signature generation by smart cards
-
Schnorr, C.: Efficient signature generation by smart cards. Journal of Cryptology 4(3), 161-174 (1991)
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.1
|