-
1
-
-
43449138479
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
-
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. J. Cryptology 21(3), 350-391 (2008)
-
(2008)
J. Cryptology
, vol.21
, Issue.3
, pp. 350-391
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
77949593967
-
Robust Encryption
-
Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
-
Abdalla, M., Bellare, M., Neven, G.: Robust Encryption. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 480-497. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5978
, pp. 480-497
-
-
Abdalla, M.1
Bellare, M.2
Neven, G.3
-
3
-
-
24944516264
-
Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Abe, M., Gennaro, R., Kurosawa, K., Shoup, V.: Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 128-146. Springer, Heidelberg (2005) (Pubitemid 41313950)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 128-146
-
-
Abe, M.1
Gennaro, R.2
Kurosawa, K.3
Shoup, V.4
-
4
-
-
38149004763
-
Randomness Reuse: Extensions and Improvements
-
Galbraith, S.D. (ed.) Cryptography and Coding 2007. Springer, Heidelberg
-
Barbosa, M., Farshim, P.: Randomness Reuse: Extensions and Improvements. In: Galbraith, S.D. (ed.) Cryptography and Coding 2007. LNCS, vol. 4887, pp. 257-276. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4887
, pp. 257-276
-
-
Barbosa, M.1
Farshim, P.2
-
5
-
-
33750065702
-
Privacy in encrypted content distribution using private broadcast encryption
-
Financial Cryptography and Data Security - 10th International Conference, FC 2006, Revised Selected Papers
-
Barth, A., Boneh, D.,Waters, B.: Privacy in Encrypted Content Distribution Using Private Broadcast Encryption. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 52-64. Springer, Heidelberg (2006) (Pubitemid 44577277)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4107 LNCS
, pp. 52-64
-
-
Barth, A.1
Boneh, D.2
Waters, B.3
-
6
-
-
84946837370
-
Key-Privacy in Public-Key Encryption
-
Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
-
Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-Privacy in Public-Key Encryption. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 566-582. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 566-582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
7
-
-
36348998232
-
Multirecipient encryption schemes: How to save on bandwidth and computation without sacrificing security
-
Bellare, M., Boldyreva, A., Kurosawa, K., Staddon, J.: Multirecipient encryption schemes: How to save on bandwidth and computation without sacrificing security. IEEE Trans. on Information Theory 53(11), 3927-3943 (2007)
-
(2007)
IEEE Trans. on Information Theory
, vol.53
, Issue.11
, pp. 3927-3943
-
-
Bellare, M.1
Boldyreva, A.2
Kurosawa, K.3
Staddon, J.4
-
8
-
-
0842283854
-
Randomness re-use in multi-recipient encryption schemes
-
Bellare, M., Boldyreva, A., Staddon, J.: Randomness Re-use in Multi-recipient Encryption Schemeas. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 85-99. Springer, Heidelberg (2003) (Pubitemid 137638344)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2567
, pp. 85-99
-
-
Bellare, M.1
Boldyreva, A.2
Staddon, J.3
-
9
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
Boneh, D., Gentry, C., Waters, B.: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258-275. Springer, Heidelberg (2005) (Pubitemid 43902118)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621 LNCS
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
10
-
-
58349086247
-
Generalized Identity Based and Broadcast Encryption Schemes
-
Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
-
Boneh, D., Hamburg, M.: Generalized Identity Based and Broadcast Encryption Schemes. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 455-470. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 455-470
-
-
Boneh, D.1
Hamburg, M.2
-
11
-
-
33746104815
-
Fully collusion resistant traitor tracing with short ciphertexts and private keys
-
DOI 10.1007/11761679-34, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Boneh, D., Sahai, A., Waters, B.: Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 573-592. Springer, Heidelberg (2006) (Pubitemid 44072262)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004 LNCS
, pp. 573-592
-
-
Boneh, D.1
Sahai, A.2
Waters, B.3
-
12
-
-
33749573228
-
Anonymous hierarchical identity-based encryption (Without random oracles)
-
Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings
-
Boyen, X., Waters, B.: Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 290-307. Springer, Heidelberg (2006) (Pubitemid 44532122)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4117 LNCS
, pp. 290-307
-
-
Boyen, X.1
Waters, B.2
-
13
-
-
35048852705
-
Chosen-Ciphertext Security from Identity-Based Encryption
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Canetti, R., Halevi, S., Katz, J.: Chosen-Ciphertext Security from Identity-Based Encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
14
-
-
44449176564
-
The Twin Diffie-Hellman Problem and Applications
-
Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
-
Cash, D., Kiltz, E., Shoup, V.: The Twin Diffie-Hellman Problem and Applications. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 127-145. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 127-145
-
-
Cash, D.1
Kiltz, E.2
Shoup, V.3
-
15
-
-
0022145479
-
Security without identification: Transaction systems to make Big Brother obsolete
-
Chaum, D.: Security without identification: Transaction systems to make Big Brother obsolete. Commun. ACM 1985 28(10), 1030-1044 (1985)
-
(1985)
Commun. ACM 1985
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
16
-
-
85024290278
-
Group Signatures
-
Davies, D.W. (ed.) EUROCRYPT 1991. Springer, Heidelberg
-
Chaum, D., van Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257-265. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
17
-
-
38149117029
-
Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
-
Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
-
Delerablée, C.: Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 200-215. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 200-215
-
-
Delerablée, C.1
-
18
-
-
38149121099
-
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
-
Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. Springer, Heidelberg
-
Delerablée, C., Paillier, P., Pointcheval, D.: Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 39-59. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4575
, pp. 39-59
-
-
Delerablée, C.1
Paillier, P.2
Pointcheval, D.3
-
19
-
-
35248901924
-
Public Key Broadcast Encryption for Stateless Receivers
-
Feigenbaum, J. (ed.) DRM 2002. Springer, Heidelberg
-
Dodis, Y., Fazio, N.: Public Key Broadcast Encryption for Stateless Receivers. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 61-80. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2696
, pp. 61-80
-
-
Dodis, Y.1
Fazio, N.2
-
20
-
-
24144468589
-
Chosen-Ciphertext Security of Multiple Encryption
-
Kilian, J. (ed.) TCC 2005. Springer, Heidelberg
-
Dodis, Y., Katz, J.: Chosen-Ciphertext Security of Multiple Encryption. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 188-209. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3378
, pp. 188-209
-
-
Dodis, Y.1
Katz, J.2
-
21
-
-
84861665813
-
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
-
Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. Springer, Heidelberg
-
Fazio, N., Perera, I.M.: Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 225-242. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7293
, pp. 225-242
-
-
Fazio, N.1
Perera, I.M.2
-
22
-
-
84979291225
-
Broadcast Encryption
-
Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
-
Fiat, A., Naor, M.: Broadcast Encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480-491. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
23
-
-
33746062799
-
Practical Identity-Based Encryption Without Random Oracles
-
Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
-
Gentry, C.: Practical Identity-Based Encryption Without Random Oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445-464. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 445-464
-
-
Gentry, C.1
-
24
-
-
67650659197
-
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Gentry, C., Waters, B.: Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 171-188. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 171-188
-
-
Gentry, C.1
Waters, B.2
-
25
-
-
34548150228
-
Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast
-
Juels, A. (ed.) FC 2004. Springer, Heidelberg
-
Groth, J.: Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 90-104. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3110
, pp. 90-104
-
-
Groth, J.1
-
26
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
DOI 10.1007/978-3-540-78967-3-9, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Katz, J., Sahai, A., Waters, B.: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 146-162. Springer, Heidelberg (2008) (Pubitemid 351762828)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965 LNCS
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
27
-
-
33745574075
-
Chosen-Ciphertext Security from Tag-Based Encryption
-
Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
-
Kiltz, E.: Chosen-Ciphertext Security from Tag-Based Encryption. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 581-600. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3876
, pp. 581-600
-
-
Kiltz, E.1
-
28
-
-
84958971364
-
Multi-recipient Public-Key Encryption with Shortened Ciphertext
-
Naccache, D., Paillier, P. (eds.) PKC 2002. Springer, Heidelberg
-
Kurosawa, K.: Multi-recipient Public-Key Encryption with Shortened Ciphertext. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 48-63. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2274
, pp. 48-63
-
-
Kurosawa, K.1
-
29
-
-
35048835796
-
A New Paradigm of Hybrid Encryption Scheme
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Kurosawa, K., Desmedt, Y.: A New Paradigm of Hybrid Encryption Scheme. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 426-442. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 426-442
-
-
Kurosawa, K.1
Desmedt, Y.2
-
30
-
-
84894128126
-
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
-
ePrint Archive: Report 2011/476
-
Libert, B., Paterson, K.G., Quaglia, E.A.: Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model. Cryptology ePrint Archive: Report 2011/476
-
Cryptology
-
-
Libert, B.1
Paterson, K.G.2
Quaglia, E.A.3
-
31
-
-
78650835413
-
A Closer Look at Anonymity and Robustness in Encryption Schemes
-
Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg
-
Mohassel, P.: A Closer Look at Anonymity and Robustness in Encryption Schemes. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 501-518. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6477
, pp. 501-518
-
-
Mohassel, P.1
-
32
-
-
84880852861
-
Revocation and Tracing Schemes for Stateless Receivers
-
Advances in Cryptology - CRYPTO 2001
-
Naor, D., Naor, M., Lotspiech, J.: Revocation and Tracing Schemes for Stateless Receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41-62. Springer, Heidelberg (2001) (Pubitemid 33317907)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
33
-
-
84937389342
-
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
-
Public Key Cryptography
-
Okamoto, T., Pointcheval, D.: The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes. In: Kim, K.-C. (ed.) PKC 2001. LNCS, vol. 1992, pp. 104-118. Springer, Heidelberg (2001) (Pubitemid 33232936)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1992
, pp. 104-118
-
-
Okamoto, T.1
Pointcheval, D.2
-
34
-
-
52149113327
-
Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
-
Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. Springer, Heidelberg
-
Paterson, K.G., Srinivasan, S.: Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 354-375. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5209
, pp. 354-375
-
-
Paterson, K.G.1
Srinivasan, S.2
|