-
1
-
-
38049032820
-
How to Shuffle in Public
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Adida, B., Wikström, D.: How to Shuffle in Public. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 555-574. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 555-574
-
-
Adida, B.1
Wikström, D.2
-
2
-
-
85180411878
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: NDSS 2005 (2005)
-
(2005)
NDSS 2005
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
3
-
-
79251578513
-
On the (Im)possibility of Obfuscating Programs
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (Im)possibility of Obfuscating Programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1-18. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
4
-
-
77957007880
-
On Strong Simulation and Composable Point Obfuscation
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Bitansky, N., Canetti, R.: On Strong Simulation and Composable Point Obfuscation. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 520-537. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 520-537
-
-
Bitansky, N.1
Canetti, R.2
-
5
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Advances in Cryptology - EUROCRYPT '98
-
Blaze, M., Bleumer, G., Strauss, M.: Divertible Protocols and Atomic Proxy Cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998) (Pubitemid 128081481)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
6
-
-
35048887476
-
Short Group Signatures
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
7
-
-
84958626314
-
Towards Realizing Random Oracles: Hash Functions that Hide All Partial Information
-
Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
-
Canetti, R.: Towards Realizing Random Oracles: Hash Functions that Hide All Partial Information. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 455-469. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 455-469
-
-
Canetti, R.1
-
8
-
-
44449095554
-
Obfuscating point functions with multibit output
-
DOI 10.1007/978-3-540-78967-3-28, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Canetti, R., Dakdouk, R.R.: Obfuscating Point Functions with Multibit Output. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 489-508. Springer, Heidelberg (2008) (Pubitemid 351762846)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965 LNCS
, pp. 489-508
-
-
Canetti, R.1
Dakdouk, R.R.2
-
9
-
-
0031624874
-
Perfectly one-way probabilistic hash functions
-
Canetti, R., Micciancio, D., Reingold, O.: Perfectly one-way probabilistic hash functions. In: STOC 1998, pp. 131-140 (1998)
-
(1998)
STOC 1998
, pp. 131-140
-
-
Canetti, R.1
Micciancio, D.2
Reingold, O.3
-
10
-
-
77949622814
-
Obfuscation of Hyperplane Membership
-
Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
-
Canetti, R., Rothblum, G.N., Varia, M.: Obfuscation of Hyperplane Membership. In:Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 72-89. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5978
, pp. 72-89
-
-
Canetti, R.1
Rothblum, G.N.2
Varia, M.3
-
12
-
-
34848837353
-
Correcting errors without leaking partial information
-
Dodis, Y., Smith, A.: Correcting errors without leaking partial information. In: STOC 2005, pp. 654-663 (2005)
-
(2005)
STOC 2005
, pp. 654-663
-
-
Dodis, Y.1
Smith, A.2
-
13
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC 2009, pp. 169-178 (2009)
-
(2009)
STOC 2009
, pp. 169-178
-
-
Gentry, C.1
-
14
-
-
33748600953
-
On the impossibility of obfuscation with auxiliary input
-
Goldwasser, S., Kalai, Y.: On the impossibility of obfuscation with auxiliary input. In: FOCS 2005, pp. 553-562 (2005)
-
(2005)
FOCS 2005
, pp. 553-562
-
-
Goldwasser, S.1
Kalai, Y.2
-
15
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: CCS 2006, pp. 89-98 (2006)
-
(2006)
CCS 2006
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
16
-
-
44449140946
-
Efficient non-interactive proof systems for bilinear groups
-
DOI 10.1007/978-3-540-78967-3-24, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Groth, J., Sahai, A.: Efficient Non-interactive Proof Systems for Bilinear Groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415-432. Springer, Heidelberg (2008) (Pubitemid 351762842)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965 LNCS
, pp. 415-432
-
-
Groth, J.1
Sahai, A.2
-
17
-
-
77954654489
-
Secure Obfuscation for Encrypted Signatures
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Hada, S.: Secure Obfuscation for Encrypted Signatures. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 92-112. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 92-112
-
-
Hada, S.1
-
18
-
-
38049056625
-
Obfuscation for Cryptographic Purposes
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Hofheinz,D.,Malone-Lee, J., Stam,M.:Obfuscation for Cryptographic Purposes. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 214-232. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 214-232
-
-
Hofheinz, D.1
Malone-Lee, J.2
Stam, M.3
-
19
-
-
38049073133
-
Securely Obfuscating Re-encryption
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Hohenberger, S., Rothblum, G.N., Shelat, A., Vaikuntanathan, V.: Securely Obfuscating Re-encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 233-252. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 233-252
-
-
Hohenberger, S.1
Rothblum, G.N.2
Shelat, A.3
Vaikuntanathan, V.4
-
20
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
DOI 10.1007/978-3-540-78967-3-9, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Katz, J., Sahai, A., Waters, B.: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 146-162. Springer, Heidelberg (2008) (Pubitemid 351762828)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965 LNCS
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
21
-
-
35048895442
-
Positive Results and Techniques for Obfuscation
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Lynn, B., Prabhakaran, M., Sahai, A.: Positive Results and Techniques for Obfuscation. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 20-39. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 20-39
-
-
Lynn, B.1
Prabhakaran, M.2
Sahai, A.3
-
22
-
-
0005301490
-
On data banks and privacy homomorphisms
-
Academic Press
-
Rivest,R., Adleman, L.,Dertouzos,M.: On data banks and privacy homomorphisms. In: Foundations of Secure Computation, pp. 169-177. Academic Press (1978)
-
(1978)
Foundations of Secure Computation
, pp. 169-177
-
-
Rivest, R.1
Adleman, L.2
Dertouzos, M.3
-
23
-
-
24944554962
-
Fuzzy Identity-Based Encryption
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
25
-
-
70350649061
-
Predicate Privacy in Encryption Systems
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Shen, E., Shi, E., Waters, B.: Predicate Privacy in Encryption Systems. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 457-473. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 457-473
-
-
Shen, E.1
Shi, E.2
Waters, B.3
-
26
-
-
23044474013
-
Evidence that xtr is more secure than supersingular elliptic curve Cryptosystems
-
Verheul, E.: Evidence that xtr is more secure than supersingular elliptic curve Cryptosystems. J. Cryptology 17(4), 277-296 (2004)
-
(2004)
J. Cryptology
, vol.17
, Issue.4
, pp. 277-296
-
-
Verheul, E.1
-
27
-
-
33745541383
-
On obfuscating point functions
-
Wee, H.: On obfuscating point functions. In: STOC 2005, pp. 523-532 (2005)
-
(2005)
STOC 2005
, pp. 523-532
-
-
Wee, H.1
|