-
1
-
-
84957069963
-
Robust Distributed Multiplication without Interaction
-
Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
-
Abe, M.: Robust Distributed Multiplication without Interaction. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 130-147. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 130-147
-
-
Abe, M.1
-
2
-
-
33646833311
-
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Abe, M., Fehr, S.: Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 317-334. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 317-334
-
-
Abe, M.1
Fehr, S.2
-
3
-
-
33746104064
-
Simplified threshold RSA with adaptive and proactive security
-
DOI 10.1007/11761679-35, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Almansa, J.F., Damgård, I., Nielsen, J.B.: Simplified Threshold RSA with Adaptive and Proactive Security. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 593-611. Springer, Heidelberg (2006) (Pubitemid 44072263)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004 LNCS
, pp. 593-611
-
-
Almansa, J.F.1
Damgard, I.2
Nielsen, J.B.3
-
4
-
-
33745604534
-
Pairing-friendly elliptic curves of prime order
-
DOI 10.1007/11693383-22, Selected Areas in Cryptography - 12th International Workshop, SAC 2005, Revised Selected Papers
-
Barreto, P.S.L.M., Naehrig, M.: Pairing-Friendly Elliptic Curves of Prime Order. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 319-331. Springer, Heidelberg (2006) (Pubitemid 43986803)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3897 LNCS
, pp. 319-331
-
-
Barreto, P.S.L.M.1
Naehrig, M.2
-
5
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM CCS, pp. 62-73 (1993)
-
(1993)
ACM CCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
79751527812
-
Batch Groth-Sahai
-
Zhou, J., Yung, M. (eds.) ACNS 2010. Springer, Heidelberg
-
Blazy, O., Fuchsbauer, G., Izabachène, M., Jambert, A., Sibert, H., Vergnaud, D.: Batch Groth-Sahai. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 218-235. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6123
, pp. 218-235
-
-
Blazy, O.1
Fuchsbauer, G.2
Izabachène, M.3
Jambert, A.4
Sibert, H.5
Vergnaud, D.6
-
7
-
-
35048841300
-
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Boneh, D., Boyen, X.: Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
8
-
-
33745655389
-
Chosen cipher-text secure public key threshold encryption without random oracles
-
DOI 10.1007/11605805-15, Topics in Cryptology - CT-RSA 2006: The Cryptographers' Track at the RSA Conference 2006, Proceedings
-
Boneh, D., Boyen, X., Halevi, S.: Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 226-243. Springer, Heidelberg (2006) (Pubitemid 43971712)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3960 LNCS
, pp. 226-243
-
-
Boneh, D.1
Boyen, X.2
Halevi, S.3
-
9
-
-
35048887476
-
Short Group Signatures
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
10
-
-
0037623983
-
Identity-Based Encryption from the Weil Pairing
-
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. SIAM J. of Computing 32(3), 586-615 (2003);
-
(2003)
SIAM J. of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
11
-
-
0012970453
-
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
-
12
-
-
24144433396
-
Evaluating 2-DNF Formulas on Ciphertexts
-
Kilian, J. (ed.) TCC 2005. Springer, Heidelberg
-
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF Formulas on Ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-341. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
13
-
-
0002181960
-
Digital Multisignatures
-
Beker, H.J., Piper, F.C. (eds.) Oxford University Press
-
Boyd, C.: Digital Multisignatures. In: Beker, H.J., Piper, F.C. (eds.) Cryptography and Coding, pp. 241-246. Oxford University Press (1989)
-
(1989)
Cryptography and Coding
, pp. 241-246
-
-
Boyd, C.1
-
14
-
-
33745767987
-
Direct Chosen Ciphertext Security from Identity-Based Techniques
-
Boyen, X., Mei, Q., Waters, B.: Direct Chosen Ciphertext Security from Identity-Based Techniques. In: ACM CCS 2005, pp. 320-329 (2005)
-
(2005)
ACM CCS 2005
, pp. 320-329
-
-
Boyen, X.1
Mei, Q.2
Waters, B.3
-
15
-
-
84957083549
-
Adaptive Security for Threshold Cryptosystems
-
Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
-
Canetti, R., Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Adaptive Security for Threshold Cryptosystems. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 98-115. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 98-115
-
-
Canetti, R.1
Gennaro, R.2
Jarecki, S.3
Krawczyk, H.4
Rabin, T.5
-
16
-
-
84957712291
-
An Efficient Threshold Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Canetti, R., Goldwasser, S.: An Efficient Threshold Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 90-106. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 90-106
-
-
Canetti, R.1
Goldwasser, S.2
-
17
-
-
84870707379
-
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
-
Advances in Cryptology - CRYPTO '98
-
Cramer, R., Shoup, V.: A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998) (Pubitemid 128118994)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
18
-
-
84947267092
-
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
-
Cramer, R., Shoup, V.: Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 45-64
-
-
Cramer, R.1
Shoup, V.2
-
19
-
-
35048852705
-
Chosen-Ciphertext Security from Identity-Based Encryption
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Canetti, R., Halevi, S., Katz, J.: Chosen-Ciphertext Security from Identity-Based Encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
20
-
-
84957717648
-
Efficient Multiparty Computations Secure against an Adaptive Adversary
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Cramer, R., Damgård, I., Dziembowski, S., Hirt, M., Rabin, T.: Efficient Multiparty Computations Secure against an Adaptive Adversary. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 311-326. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 311-326
-
-
Cramer, R.1
Damgård, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
21
-
-
21144458613
-
Share conversion, pseudorandom secret-sharing and applications to secure computation
-
Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
-
Cramer, R., Damgård, I., Ishai, Y.: Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 342-362. Springer, Heidelberg (2005) (Pubitemid 41231173)
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 342-362
-
-
Cramer, R.1
Damgard, I.2
Ishai, Y.3
-
22
-
-
85029541173
-
Towards Practical Public Key Systems Secure against Chosen Ciphertext Attacks
-
Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
-
Damgård, I.: Towards Practical Public Key Systems Secure against Chosen Ciphertext Attacks. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 445-456. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 445-456
-
-
Damgård, I.1
-
23
-
-
85032188633
-
Society and Group Oriented Cryptography: A New Concept
-
Pomerance, C. (ed.) CRYPTO 1987. Springer, Heidelberg
-
Desmedt, Y.: Society and Group Oriented Cryptography: A New Concept. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 120-127. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 120-127
-
-
Desmedt, Y.1
-
24
-
-
85023809951
-
Threshold Cryptosystems
-
Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
-
Desmedt, Y., Frankel, Y.: Threshold Cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307-315. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
25
-
-
24144468589
-
Chosen-Ciphertext Security of Multiple Encryption
-
Kilian, J. (ed.) TCC 2005. Springer, Heidelberg
-
Dodis, Y., Katz, J.: Chosen-Ciphertext Security of Multiple Encryption. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 188-209. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3378
, pp. 188-209
-
-
Dodis, Y.1
Katz, J.2
-
26
-
-
84946827596
-
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
-
Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
-
Fouque, P.-A., Pointcheval, D.: Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 351-368. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 351-368
-
-
Fouque, P.-A.1
Pointcheval, D.2
-
27
-
-
84958045007
-
Adaptively-Secure Distributed Public-Key Systems
-
Nešetřil, J. (ed.) ESA 1999. Springer, Heidelberg
-
Frankel, Y., MacKenzie, P., Yung, M.: Adaptively-Secure Distributed Public-Key Systems. In: Nešetřil, J. (ed.) ESA 1999. LNCS, vol. 1643, pp. 4-27. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1643
, pp. 4-27
-
-
Frankel, Y.1
MacKenzie, P.2
Yung, M.3
-
28
-
-
84956868458
-
Adaptively-Secure Optimal-Resilience Proactive RSA
-
Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. Springer, Heidelberg
-
Frankel, Y., MacKenzie, P., Yung, M.: Adaptively-Secure Optimal-Resilience Proactive RSA. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol. 1716, pp. 180-195. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1716
, pp. 180-195
-
-
Frankel, Y.1
MacKenzie, P.2
Yung, M.3
-
29
-
-
77954639466
-
Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Freeman, D.M.: Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 44-61. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 44-61
-
-
Freeman, D.M.1
-
30
-
-
77649262306
-
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
-
Lai, X., Chen, K. (eds.) ASIACRYPT 2006. Springer, Heidelberg
-
Groth, J.: Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 444-459. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 444-459
-
-
Groth, J.1
-
31
-
-
33746072569
-
Perfect Non-interactive Zero Knowledge for NP
-
Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
-
Groth, J., Ostrovsky, R., Sahai, A.: Perfect Non-interactive Zero Knowledge for NP. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 339-358. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 339-358
-
-
Groth, J.1
Ostrovsky, R.2
Sahai, A.3
-
32
-
-
44449140946
-
Efficient non-interactive proof systems for bilinear groups
-
DOI 10.1007/978-3-540-78967-3-24, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Groth, J., Sahai, A.: Efficient Non-interactive Proof Systems for Bilinear Groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415-432. Springer, Heidelberg (2008) (Pubitemid 351762842)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965 LNCS
, pp. 415-432
-
-
Groth, J.1
Sahai, A.2
-
33
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
Håstad, J., Impagliazzo, R., Levin, L., Luby, M.: A pseudorandom generator from any one-way function. SIAM Journal on Computing 28(4), 1364-1396 (1999)
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.3
Luby, M.4
-
34
-
-
70350302871
-
The Group of Signed Quadratic Residues and Applications
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Hofheinz, D., Kiltz, E.: The Group of Signed Quadratic Residues and Applications. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 637-653. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 637-653
-
-
Hofheinz, D.1
Kiltz, E.2
-
35
-
-
84948968753
-
Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures
-
Extended Abstract. Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Jarecki, S., Lysyanskaya, A.: Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures (Extended Abstract). In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 221-242. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 221-242
-
-
Jarecki, S.1
Lysyanskaya, A.2
-
36
-
-
79953207657
-
Round-Optimal Password-Based Authenticated Key Exchange
-
Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
-
Katz, J., Vaikuntanathan, V.: Round-Optimal Password-Based Authenticated Key Exchange. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 293-310. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6597
, pp. 293-310
-
-
Katz, J.1
Vaikuntanathan, V.2
-
37
-
-
33745574075
-
Chosen-Ciphertext Security from Tag-Based Encryption
-
Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
-
Kiltz, E.: Chosen-Ciphertext Security from Tag-Based Encryption. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 581-600. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3876
, pp. 581-600
-
-
Kiltz, E.1
-
38
-
-
67650667958
-
A New Randomness Extraction Paradigm for Hybrid Encryption
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Kiltz, E., Pietrzak, K., Stam, M., Yung, M.: A New Randomness Extraction Paradigm for Hybrid Encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 590-609. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 590-609
-
-
Kiltz, E.1
Pietrzak, K.2
Stam, M.3
Yung, M.4
-
39
-
-
77949581448
-
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
-
Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
-
Lewko, A., Waters, B.: New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 455-479. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5978
, pp. 455-479
-
-
Lewko, A.1
Waters, B.2
-
40
-
-
79959977713
-
Adaptively Secure Non-interactive Threshold Cryptosystems
-
Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part II. Springer, Heidelberg
-
Libert, B., Yung, M.: Adaptively Secure Non-interactive Threshold Cryptosystems. In: Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part II. LNCS, vol. 6756, pp. 588-600. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6756
, pp. 588-600
-
-
Libert, B.1
Yung, M.2
-
41
-
-
26444507178
-
An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack
-
Desmedt, Y.G. (ed.) PKC 2003. Springer, Heidelberg
-
MacKenzie, P.: An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 47-61. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2567
, pp. 47-61
-
-
MacKenzie, P.1
-
42
-
-
30744458170
-
Alternatives to Non-malleability: Definitions, Constructions, and Applications
-
Naor, M. (ed.) TCC 2004. Springer, Heidelberg
-
MacKenzie, P., Reiter, M.K., Yang, K.: Alternatives to Non-malleability: Definitions, Constructions, and Applications. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 171-190. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2951
, pp. 171-190
-
-
MacKenzie, P.1
Reiter, M.K.2
Yang, K.3
-
43
-
-
79953188689
-
Signatures Resilient to Continual Leakage on Memory and Computation
-
Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
-
Malkin, T., Teranishi, I., Vahlis, Y., Yung, M.: Signatures Resilient to Continual Leakage on Memory and Computation. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 89-106. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6597
, pp. 89-106
-
-
Malkin, T.1
Teranishi, I.2
Vahlis, Y.3
Yung, M.4
-
44
-
-
0024983231
-
Public-key cryptosystems provably secure against chosen ciphertext attacks
-
ACM Press
-
Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: STOC 1990. ACM Press (1990)
-
(1990)
STOC 1990
-
-
Naor, M.1
Yung, M.2
-
46
-
-
84974554584
-
Non-interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
-
Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
-
Rackoff, C., Simon, D.R.: Non-interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433-444. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
-
47
-
-
0033342534
-
Non-Malleable Non-Interactive Zero Knowledge and Adaptive Chosen-Ciphertext Security
-
Sahai, A.: Non-Malleable Non-Interactive Zero Knowledge and Adaptive Chosen-Ciphertext Security. In: FOCS 1999, pp. 543-553 (1999)
-
(1999)
FOCS 1999
, pp. 543-553
-
-
Sahai, A.1
-
48
-
-
33646718113
-
Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number
-
Report 2002/164
-
Scott, M.: Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number. Cryptology ePrint Archive: Report 2002/164
-
Cryptology ePrint Archive
-
-
Scott, M.1
-
49
-
-
85020598353
-
Identity-Based Cryptosystems and Signature Schemes
-
Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
-
Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
50
-
-
1842599265
-
Securing Threshold Cryptosystems against Chosen Ciphertext Attack
-
Shoup, V., Gennaro, R.: Securing Threshold Cryptosystems against Chosen Ciphertext Attack. J. of Cryptology 15(2), 75-96 (2002).
-
(2002)
J. of Cryptology
, vol.15
, Issue.2
, pp. 75-96
-
-
Shoup, V.1
Gennaro, R.2
-
51
-
-
84858300751
-
-
Nyberg, K. (ed.) EUROCRYPT 1998. Springer, Heidelberg
-
In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 1-16. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 1-16
-
-
-
52
-
-
70350345210
-
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Waters, B.: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619-636. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 619-636
-
-
Waters, B.1
-
53
-
-
77957000385
-
Efficient Chosen-Ciphertext Security via Extractable Hash Proofs
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Wee, H.: Efficient Chosen-Ciphertext Security via Extractable Hash Proofs. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 314-332. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 314-332
-
-
Wee, H.1
-
54
-
-
79958014514
-
Threshold and Revocation Cryptosystems via Extractable Hash Proofs
-
Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
-
Wee, H.: Threshold and Revocation Cryptosystems via Extractable Hash Proofs. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 589-609. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
, pp. 589-609
-
-
Wee, H.1
|