-
1
-
-
33749993205
-
Constant-size dynamic k-TAA
-
Security and Cryptography for Networks - 5th International Conference, SCN 2006, Proceedings
-
Au, M.H., Susilo, W., Mu, Y.: Constant-size dynamic k-TAA. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 111-125. Springer, Heidelberg (2006) (Pubitemid 44568294)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4116
, pp. 111-125
-
-
Au, M.H.1
Susilo, W.2
Mu, Y.3
-
2
-
-
35048887476
-
Short group signatures
-
Franklin, M. (ed.) CRYPTO 2004, Springer, Heidelberg
-
Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
3
-
-
69949124606
-
Randomizable proofs and delegatable anonymous credentials
-
Halevi, S. (ed.) CRYPTO 2009, Springer, Heidelberg
-
Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., Shacham, H.: Randomizable proofs and delegatable anonymous credentials. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 108-125. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 108-125
-
-
Belenkiy, M.1
Camenisch, J.2
Chase, M.3
Kohlweiss, M.4
Lysyanskaya, A.5
Shacham, H.6
-
4
-
-
14844297757
-
Concealing complex policies with hidden credentials
-
ACM Press, New York
-
Bradshaw, R.W., Holt, J.E., Seamons, K.E.: Concealing complex policies with hidden credentials. In: 11th (CCS 2004), pp. 46-157. ACM Press, New York (2004)
-
(2004)
11th (CCS 2004)
, pp. 46-157
-
-
Bradshaw, R.W.1
Holt, J.E.2
Seamons, K.E.3
-
6
-
-
0000731055
-
Security and composition of multi-party cryptographic protocols
-
Canetti, R.: Security and composition of multi-party cryptographic protocols. Journal of Cryptology 13(1), 143-202 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
7
-
-
67650691588
-
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
-
Joux, A. (ed.) EUROCRYPT 2009, Springer, Heidelberg
-
Camenisch, J., Chandran, N., Shoup, V.: A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 351-368. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 351-368
-
-
Camenisch, J.1
Chandran, N.2
Shoup, V.3
-
8
-
-
74049137084
-
Oblivious transfer with access control
-
ACM Press, New York
-
Camenisch, J., Dubovitskaya, M., Neven, G.: Oblivious transfer with access control. In: ACM CCS 2009, pp. 131-140. ACM Press, New York (2009)
-
(2009)
ACM CCS 2009
, pp. 131-140
-
-
Camenisch, J.1
Dubovitskaya, M.2
Neven, G.3
-
9
-
-
67049100253
-
Controlling access to an oblivious database using stateful anonymous credentials
-
Jarecki, S., Tsudik, G. (eds.) PKC 2009, Springer, Heidelberg
-
Coull, S., Green, M., Hohenberger, S.: Controlling access to an oblivious database using stateful anonymous credentials. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 501-520. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5443
, pp. 501-520
-
-
Coull, S.1
Green, M.2
Hohenberger, S.3
-
10
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Franklin, M. (ed.) CRYPTO 2004, Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
11
-
-
38049132285
-
Simulatable adaptive oblivious transfer
-
Naor, M. (ed.) EUROCRYPT 2007, Springer, Heidelberg
-
Camenisch, J., Neven, G., Shelat, A.: Simulatable adaptive oblivious transfer. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 573-590. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 573-590
-
-
Camenisch, J.1
Neven, G.2
Shelat, A.3
-
12
-
-
77957005693
-
Cryptography against continuous memory attacks
-
Dodis, Y., Haralambiev, K., Lopez-Alt, A., Wichs, D.: Cryptography against continuous memory attacks. Cryptology ePrint Archive, Report 2010/196 (2010)
-
(2010)
Cryptology EPrint Archive, Report 2010/196
-
-
Dodis, Y.1
Haralambiev, K.2
Lopez-Alt, A.3
Wichs, D.4
-
13
-
-
24144481228
-
A verifiable random function with short proofs and keys
-
Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
-
Dodis, Y., Yampolskiy, A.: A verifiable random function with short proofs and keys. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 416-431. Springer, Heidelberg (2005) (Pubitemid 41231346)
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 416-431
-
-
Dodis, Y.1
Yampolskiy, A.2
-
14
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4), 469-472 (1985)
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
15
-
-
33748485156
-
Attribute-based access control with hidden policies and hidden credentials
-
DOI 10.1109/TC.2006.158
-
Frikken, K.B., Atallah, M.J., Li, J.: Attribute-based access control with hidden policies and hidden credentials. IEEE Trans. Computers 55(10), 1259-1270 (2006) (Pubitemid 44355937)
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.10
, pp. 1259-1270
-
-
Frikken, K.1
Atallah, M.2
Li, J.3
-
16
-
-
44449140946
-
Efficient non-interactive proof systems for bilinear groups
-
DOI 10.1007/978-3-540-78967-3-24, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415-432. Springer, Heidelberg (2008) (Pubitemid 351762842)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965
, pp. 415-432
-
-
Groth, J.1
Sahai, A.2
-
17
-
-
1642394295
-
Hidden credentials
-
USA, ACM, New York
-
Holt, J.E., Bradshaw, R.W., Seamons, K.E., Orman, H.K.: Hidden credentials. In: ACM WPES 2003, USA, pp. 1-8. ACM, New York (2003)
-
(2003)
ACM WPES 2003
, pp. 1-8
-
-
Holt, J.E.1
Bradshaw, R.W.2
Seamons, K.E.3
Orman, H.K.4
-
19
-
-
84893110297
-
Towards practical automated trust negotiation
-
Washington, DC, USA, IEEE Computer Society, Los Alamitos
-
Li, N., Winsborough, W.: Towards practical automated trust negotiation. In: POLICY 2002, Washington, DC, USA, p. 92. IEEE Computer Society, Los Alamitos (2002)
-
(2002)
POLICY 2002
, pp. 92
-
-
Li, N.1
Winsborough, W.2
-
20
-
-
67049119911
-
Revocable group signature schemes with constant costs for signing and verifying
-
Jarecki, S., Tsudik, G. (eds.) PKC 2009, Springer, Heidelberg
-
Nakanishi, T., Fujii, H., Hira, Y., Funabiki, N.: Revocable group signature schemes with constant costs for signing and verifying. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 463-480. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5443
, pp. 463-480
-
-
Nakanishi, T.1
Fujii, H.2
Hira, Y.3
Funabiki, N.4
-
21
-
-
84957096920
-
Oblivious transfer with adaptive queries
-
Wiener, M. (ed.) CRYPTO 1999, Springer, Heidelberg
-
Naor, M., Pinkas, B.: Oblivious transfer with adaptive queries. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 573-590. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 573-590
-
-
Naor, M.1
Pinkas, B.2
-
24
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
Harvard Aiken Computation Laboratory
-
Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard Aiken Computation Laboratory (1981)
-
(1981)
Technical Report TR-81
-
-
Rabin, M.O.1
-
25
-
-
0020312165
-
Protocols for secure computations
-
IEEE Computer Society Press, Los Alamitos
-
Yao, A.C.: Protocols for secure computations. In: 23rd FOCS, pp. 160-164. IEEE Computer Society Press, Los Alamitos (1982)
-
(1982)
23rd FOCS
, pp. 160-164
-
-
Yao, A.C.1
-
26
-
-
0038148412
-
A unified scheme for resource protection in automated trust negotiation
-
USA IEEE Computer Society, Los Alamitos
-
Yu, T., Winslett, M.: A unified scheme for resource protection in automated trust negotiation. In: IEEE Symposium on Security and Privacy (S&P 2003), USA, pp. 110-122. IEEE Computer Society, Los Alamitos (2003)
-
(2003)
IEEE Symposium on Security and Privacy (S&P 2003)
, pp. 110-122
-
-
Yu, T.1
Winslett, M.2
-
27
-
-
0035747337
-
Interoperable strategies in automated trust negotiation
-
Yu, T., Winslett, M., Seamons, K.E.: Interoperable strategies in automated trust negotiation. In: ACM CCS 2001, pp. 146-155. ACM Press, New York (2001) (Pubitemid 34974715)
-
(2001)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 146-155
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
28
-
-
84945134014
-
Priced oblivious transfer: How to sell digital goods
-
Pfitzmann, B. (ed.) EUROCRYPT 2001, Springer, Heidelberg
-
Aiello, W., Ishai, Y., Reingold, O.: Priced oblivious transfer: How to sell digital goods. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, p. 119. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 119
-
-
Aiello, W.1
Ishai, Y.2
Reingold, O.3
|