-
2
-
-
0038487086
-
Secret handshakes from pairing-based key agreements
-
IEEE CS, Los Alamitos
-
Balfanz, D., Durfee, G., Shankar, N., Smetters, D.K., Staddon, J., Wong, H.-C.: Secret Handshakes from Pairing-Based Key Agreements. In: IEEE Symposium on Security and Privacy 2003, pp. 180-196. IEEE CS, Los Alamitos (2003)
-
(2003)
IEEE Symposium on Security and Privacy 2003
, pp. 180-196
-
-
Balfanz, D.1
Durfee, G.2
Shankar, N.3
Smetters, D.K.4
Staddon, J.5
Wong, H.-C.6
-
4
-
-
70350400269
-
Private intersection of certified sets
-
Dingledine, R., Golle, P. (eds.) FC 2009. Springer, Heidelberg
-
Camenisch, J., Zaverucha, G.M.: Private Intersection of Certified Sets. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 108-127. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5628
, pp. 108-127
-
-
Camenisch, J.1
Zaverucha, G.M.2
-
5
-
-
35048860626
-
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001) (Pubitemid 33275848)
-
(2001)
LNCS
, Issue.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
6
-
-
35048855095
-
Secret handshakes from CA-oblivious encryption
-
Castelluccia, C., Jarecki, S., Tsudik, G.: Secret Handshakes from CA-Oblivious Encryption. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 293-307. Springer, Heidelberg (2004) (Pubitemid 39747761)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3329
, pp. 293-307
-
-
Castelluccia, C.1
Jarecki, S.2
Tsudik, G.3
-
7
-
-
69949150672
-
Privacy-preserving policy-based information transfer
-
Goldberg, I., Atallah, M.J. (eds.) PETS 2009. Springer, Heidelberg
-
Cristofaro, E., Jarecki, S., Kim, J., Tsudik, G.: Privacy-Preserving Policy-Based Information Transfer. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 164-184. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5672
, pp. 164-184
-
-
Cristofaro, E.1
Jarecki, S.2
Kim, J.3
Tsudik, G.4
-
8
-
-
84929333399
-
Practical private set intersection protocols with linear computational and bandwidth complexity
-
Cryptology ePrint Archive, Report 2009/491. To appear in Financial Cryptography and Data Security. Springer, Heidelberg
-
Cristofaro, E., Tsudik, G.: Practical Private Set Intersection Protocols with Linear Computational and Bandwidth Complexity. Cryptology ePrint Archive, Report 2009/491. To appear in Financial Cryptography and Data Security. LNCS, vol. 6052. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6052
-
-
Cristofaro, E.1
Tsudik, G.2
-
9
-
-
35048820609
-
Efficient private matching and set intersection
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Freedman, M.J., Nissim, K., Pinkas, B.: Efficient Private Matching and Set Intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
10
-
-
40249108370
-
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
-
Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
-
Hazay, C., Lindell, Y.: Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 155-175. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 155-175
-
-
Hazay, C.1
Lindell, Y.2
-
11
-
-
79955547393
-
Efficient set operations in the presence of malicious adversaries
-
Cryptology ePrint Archive, Report 2009/594. Nguyen, P.Q., Pointcheval, D. (Eds.) PKC 2010. Springer, Heidelberg
-
Hazay, C., Nissim, K.: Efficient Set Operations in the Presence of Malicious Adversaries. Cryptology ePrint Archive, Report 2009/594. In: Nguyen, P.Q., Pointcheval, D. (Eds.) PKC 2010. LNCS, vol. 6056, pp. 312-331. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6056
, pp. 312-331
-
-
Hazay, C.1
Nissim, K.2
-
12
-
-
84867284322
-
Group secret handshakes or affiliation-hiding authenticated group key agreement
-
Abe, M. (ed.) CT-RSA 2007. Springer, Heidelberg
-
Jarecki, S., Kim, J., Tsudik, G.: Group Secret Handshakes or Affiliation-Hiding Authenticated Group Key Agreement. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 287-308. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4377
, pp. 287-308
-
-
Jarecki, S.1
Kim, J.2
Tsudik, G.3
-
13
-
-
43149110632
-
Beyond secret handshakes: Affiliation-hiding authenticated key exchange
-
DOI 10.1007/978-3-540-79263-5-23, Topics in Cryptology - CT-RSA 2008 - The Cryptographers' Track at the RSA Conference 2008, Proceedings
-
Jarecki, S., Kim, J., Tsudik, G.: Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 352-369. Springer, Heidelberg (2008) (Pubitemid 351641994)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4964
, pp. 352-369
-
-
Jarecki, S.1
Kim, J.2
Tsudik, G.3
-
14
-
-
38049060325
-
Unlinkable secret handshakes and key-private group key management schemes
-
Katz, J., Yung, M. (eds.) ACNS 2007. Springer, Heidelberg
-
Jarecki, S., Liu, X.: Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 270-287. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4521
, pp. 270-287
-
-
Jarecki, S.1
Liu, X.2
-
15
-
-
70350656283
-
Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Jarecki, S., Liu, X.: Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 577-594. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 577-594
-
-
Jarecki, S.1
Liu, X.2
-
16
-
-
70350325165
-
Private mutual authentication and conditional oblivious transfer
-
Halevi, S. (ed.) Advances in Cryptology - CRYPTO 2009. Springer, Heidelberg
-
Jarecki, S., Liu, X.: Private Mutual Authentication and Conditional Oblivious Transfer. In: Halevi, S. (ed.) Advances in Cryptology - CRYPTO 2009. LNCS, vol. 5677, pp. 90-107. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 90-107
-
-
Jarecki, S.1
Liu, X.2
-
17
-
-
33745160750
-
Privacy-preserving set operations
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
Kissner, L., Song, D.X.: Privacy-Preserving Set Operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241-257. Springer, Heidelberg (2005) (Pubitemid 43902117)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621
, pp. 241-257
-
-
Kissner, L.1
Song, D.2
-
18
-
-
84958683395
-
Balls into bins - A simple and tight analysis
-
Rolim, J.D.P., Serna, M., Luby, M. (eds.) RANDOM 1998. Springer, Heidelberg
-
Raab, M., Steger, A.: Balls Into Bins - A Simple and Tight Analysis. In: Rolim, J.D.P., Serna, M., Luby, M. (eds.) RANDOM 1998. LNCS, vol. 1518, pp. 159-170. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1518
, pp. 159-170
-
-
Raab, M.1
Steger, A.2
-
19
-
-
49049098105
-
A flexible framework for secret handshakes
-
Danezis, G., Golle, P. (eds.) PET 2006. Springer, Heidelberg
-
Tsudik, G., Xu, S.: A Flexible Framework for Secret Handshakes. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 295-315. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4258
, pp. 295-315
-
-
Tsudik, G.1
Xu, S.2
-
20
-
-
33746772091
-
RSA-based secret handshakes
-
Coding and Cryptography - International Workshop, WCC 2005, Revised Selected Papers
-
Vergnaud, D.: RSA-Based Secret Handshakes. In: Ytrehus, Ø. (ed.) WCC 2005. LNCS, vol. 3969, pp. 252-274. Springer, Heidelberg (2006) (Pubitemid 44165469)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3969
, pp. 252-274
-
-
Vergnaud, D.1
-
21
-
-
14844289583
-
k-anonymous secret handshakes with reusable credentials
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
Xu, S., Yung, M.: k-Anonymous Secret Handshakes with Reusable Credentials. In: 11th ACM Conference on Computer and Communications Security (CCS 2004), pp. 158-167. ACM, New York (2004) (Pubitemid 40347107)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 158-167
-
-
Xu, S.1
Yung, M.2
|