-
2
-
-
0023545074
-
On hiding information from an oracle
-
Abadi, M., Feigenbaum, J., Kilian, J.: On hiding information from an oracle. In: Proceedings of the 19th Annual ACM Symposium on Theory of Computing (STOC), pp. 195-203 (1987)
-
(1987)
Proceedings of the 19th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 195-203
-
-
Abadi, M.1
Feigenbaum, J.2
Kilian, J.3
-
3
-
-
77956778645
-
Secure outsourcing of scientific computations
-
Atallah, M.J., Pantazopoulos, K.N., Rice, J.R., Spafford, E.H.: Secure outsourcing of scientific computations. Advances in Computers 54, 216-272 (2001)
-
(2001)
Advances in Computers
, vol.54
, pp. 216-272
-
-
Atallah, M.J.1
Pantazopoulos, K.N.2
Rice, J.R.3
Spafford, E.H.4
-
5
-
-
35048873387
-
Identity-Based Chameleon Hash and Applications
-
Juels, A. (ed.) FC 2004. Springer, Heidelberg
-
Ateniese, G., de Medeiros, B.: Identity-Based Chameleon Hash and Applications. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 164-180. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3110
, pp. 164-180
-
-
Ateniese, G.1
De Medeiros, B.2
-
6
-
-
23944526438
-
On the Key Exposure Problem in Chameleon Hashes
-
Blundo, C., Cimato, S. (eds.) SCN 2004. Springer, Heidelberg
-
Ateniese, G., de Medeiros, B.: On the Key Exposure Problem in Chameleon Hashes. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 165-179. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3352
, pp. 165-179
-
-
Ateniese, G.1
De Medeiros, B.2
-
7
-
-
45749113016
-
Improved Conditional E-Payments
-
Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. Springer, Heidelberg
-
Blanton, M.: Improved Conditional E-Payments. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 188-206. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5037
, pp. 188-206
-
-
Blanton, M.1
-
9
-
-
0000867507
-
Minimum disclosure proofs of knowledge
-
Brassard, G., Chaum, D., Crepeau, C.: Minimum disclosure proofs of knowledge. Journal of Computer and System Sciences 37(2), 156-189 (1988)
-
(1988)
Journal of Computer and System Sciences
, vol.37
, Issue.2
, pp. 156-189
-
-
Brassard, G.1
Chaum, D.2
Crepeau, C.3
-
10
-
-
0001870201
-
Locally random reductions: Improvements and applications
-
Beaver, D., Feigenbaum, J., Kilian, J., Rogaway, P.: Locally random reductions: Improvements and applications. Journal of Cryptology 10(1), 17-36 (1997)
-
(1997)
Journal of Cryptology
, vol.10
, Issue.1
, pp. 17-36
-
-
Beaver, D.1
Feigenbaum, J.2
Kilian, J.3
Rogaway, P.4
-
11
-
-
84898945449
-
Multi-prover interactive proofs: How to remove intractability assumptions
-
Ben-Or, M., Goldwasser, S., Kilian, J., Wigderson, A.: Multi-prover interactive proofs: How to remove intractability assumptions. In: Proceedings of the ACM Symposium on Theory of Computing (STOC), pp. 113-131 (1988)
-
(1988)
Proceedings of the ACM Symposium on Theory of Computing (STOC)
, pp. 113-131
-
-
Ben-Or, M.1
Goldwasser, S.2
Kilian, J.3
Wigderson, A.4
-
12
-
-
80051977699
-
Verifiable Delegation of Computation over Large Datasets
-
Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
-
Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable Delegation of Computation over Large Datasets. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 111-131. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6841
, pp. 111-131
-
-
Benabbas, S.1
Gennaro, R.2
Vahlis, Y.3
-
13
-
-
8644237883
-
Program result checking against adaptive programs and in cryptographic settings
-
Blum, M., Luby, M., Rubinfeld, R.: Program result checking against adaptive programs and in cryptographic settings. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, pp. 107-118 (1991)
-
(1991)
DIMACS Series in Discrete Mathematics and Theoretical Computer Science
, pp. 107-118
-
-
Blum, M.1
Luby, M.2
Rubinfeld, R.3
-
14
-
-
0000619172
-
Self-testing/correcting with applications to numerical problems
-
Blum, M., Luby, M., Rubinfeld, R.: Self-testing/correcting with applications to numerical problems. Journal of Computer and System Science, 549-595 (1993)
-
(1993)
Journal of Computer and System Science
, pp. 549-595
-
-
Blum, M.1
Luby, M.2
Rubinfeld, R.3
-
15
-
-
84957610823
-
Speeding up Discrete Log and Factoring Based Schemes via Precomputations
-
Nyberg, K. (ed.) EUROCRYPT 1998. Springer, Heidelberg
-
Boyko, V., Peinado, M., Venkatesan, R.: Speeding up Discrete Log and Factoring Based Schemes via Precomputations. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 221-235. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 221-235
-
-
Boyko, V.1
Peinado, M.2
Venkatesan, R.3
-
16
-
-
84957093995
-
On Concurrent Zero-Knowledge with Preprocessing (Extended Abstract)
-
Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
-
Di Crescenzo, G., Ostrovsky, R.: On Concurrent Zero-Knowledge with Preprocessing (Extended Abstract). In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 485-502. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 485-502
-
-
Di Crescenzo, G.1
Ostrovsky, R.2
-
17
-
-
85001025766
-
Wallet Databases with Observers
-
Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
-
Chaum, D., Pedersen, T.P.: Wallet Databases with Observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89-105. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
18
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal of Computing 33, 167-226 (2003)
-
(2003)
SIAM Journal of Computing
, vol.33
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
19
-
-
58449123075
-
Conditional Payments for Computing Markets
-
Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. Springer, Heidelberg
-
Carbunar, B., Tripunitara, M.: Conditional Payments for Computing Markets. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 317-331. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5339
, pp. 317-331
-
-
Carbunar, B.1
Tripunitara, M.2
-
21
-
-
35048828982
-
Chameleon Hashing Without Key Exposure
-
Zhang, K., Zheng, Y. (eds.) ISC 2004. Springer, Heidelberg
-
Chen, X., Zhang, F., Kim, K.: Chameleon Hashing Without Key Exposure. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 87-98. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3225
, pp. 87-98
-
-
Chen, X.1
Zhang, F.2
Kim, K.3
-
22
-
-
38049075273
-
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure
-
Katz, J., Yung, M. (eds.) ACNS 2007. Springer, Heidelberg
-
Chen, X., Zhang, F., Susilo, W., Mu, Y.: Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 18-30. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4521
, pp. 18-30
-
-
Chen, X.1
Zhang, F.2
Susilo, W.3
Mu, Y.4
-
23
-
-
84983134965
-
Efficient Non-malleable Commitment Schemes
-
Bellare, M. (ed.) CRYPTO 2000. Springer, Heidelberg
-
Fischlin, M., Fischlin, R.: Efficient Non-malleable Commitment Schemes. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 413-431. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 413-431
-
-
Fischlin, M.1
Fischlin, R.2
-
24
-
-
0003157491
-
On-line/Off-line digital signatures
-
Even, S., Goldreich, O., Micali, S.: On-line/Off-line digital signatures. Journal of Cryptology 9(1), 35-67 (1996)
-
(1996)
Journal of Cryptology
, vol.9
, Issue.1
, pp. 35-67
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
25
-
-
26444461753
-
Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure under Concurrent Man-in-the-Middle Attacks
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Gennaro, R.: Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 220-236. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 220-236
-
-
Gennaro, R.1
-
27
-
-
77957005936
-
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Gennaro, R., Gentry, C., Parno, B.: Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465-482. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
28
-
-
57049095424
-
Delegating computation: Interactive proofs for muggles
-
Goldwasser, S., Kalai, Y.T., Rothblum, G.N.: Delegating computation: interactive proofs for muggles. In: Proceedings of the ACM Symposium on the Theory of Computing (STOC), pp. 113-122 (2008)
-
(2008)
Proceedings of the ACM Symposium on the Theory of Computing (STOC)
, pp. 113-122
-
-
Goldwasser, S.1
Kalai, Y.T.2
Rothblum, G.N.3
-
29
-
-
33646773954
-
Server-Aided Verification: Theory and Practice
-
Roy, B. (ed.) ASIACRYPT 2005. Springer, Heidelberg
-
Girault, M., Lefranc, D.: Server-Aided Verification: Theory and Practice. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 605-623. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 605-623
-
-
Girault, M.1
Lefranc, D.2
-
30
-
-
0024611659
-
The knowledge complexity of interactive proof-systems
-
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. SIAM Journal on Computing 18(1), 186-208 (1989)
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
31
-
-
84937555419
-
Uncheatable Distributed Computations
-
Naccache, D. (ed.) CT-RSA 2001. Springer, Heidelberg
-
Golle, P., Mironov, I.: Uncheatable Distributed Computations. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 425-440. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2020
, pp. 425-440
-
-
Golle, P.1
Mironov, I.2
-
32
-
-
35248886595
-
Strengthening Zero-knowledge Protocols Using Signatures
-
Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
-
Garay, J., MacKenzie, P., Yang, K.: Strengthening Zero-knowledge Protocols Using Signatures. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 177-194. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 177-194
-
-
Garay, J.1
MacKenzie, P.2
Yang, K.3
-
33
-
-
24144493423
-
How to Securely Outsource Cryptographic Computations
-
Kilian, J. (ed.) TCC 2005. Springer, Heidelberg
-
Hohenberger, S., Lysyanskaya, A.: How to Securely Outsource Cryptographic Computations. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 264-282. Springer, Heidelberg (2005), http://www.cs.jhu.edu/
-
(2005)
LNCS
, vol.3378
, pp. 264-282
-
-
Hohenberger, S.1
Lysyanskaya, A.2
-
35
-
-
84957654400
-
Improved Efficient Arguments
-
Coppersmith, D. (ed.) CRYPTO 1995. Springer, Heidelberg
-
Kilian, J.: Improved Efficient Arguments. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 311-324. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.963
, pp. 311-324
-
-
Kilian, J.1
-
39
-
-
85031767993
-
Speeding up Secret Computations with Insecure Auxiliary Devices
-
Goldwasser, S. (ed.) CRYPTO 1988. Springer, Heidelberg
-
Matsumoto, T., Kato, K., Imai, H.: Speeding up Secret Computations with Insecure Auxiliary Devices. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 497-506. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.403
, pp. 497-506
-
-
Matsumoto, T.1
Kato, K.2
Imai, H.3
-
40
-
-
24144458382
-
Distribution of modular sums and the security of server aided exponentiation
-
Nguyen, P.Q., Shparlinski, I.E., Stern, J.: Distribution of modular sums and the security of server aided exponentiation. In: Proceedings of the Workshop on Comp. Number Theory and Crypt., pp. 1-16 (1999)
-
(1999)
Proceedings of the Workshop on Comp. Number Theory and Crypt.
, pp. 1-16
-
-
Nguyen, P.Q.1
Shparlinski, I.E.2
Stern, J.3
-
41
-
-
84858307151
-
How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption
-
Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
-
Parno, B., Raykova,M., Vaikuntanathan, V.: How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 422-439. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7194
, pp. 422-439
-
-
Parno, B.1
Raykova, M.2
Vaikuntanathan, V.3
-
42
-
-
12344258539
-
Efficient signature generation for smart cards
-
Schnorr, C.P.: Efficient signature generation for smart cards. Journal of Cryptology 4(3), 239-252 (1991)
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 239-252
-
-
Schnorr, C.P.1
-
43
-
-
38549097531
-
Conditional E-Cash
-
Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. Springer, Heidelberg
-
Shi, L., Carbunar, B., Sion, R.: Conditional E-Cash. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 15-28. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4886
, pp. 15-28
-
-
Shi, L.1
Carbunar, B.2
Sion, R.3
-
44
-
-
84880883264
-
Improved Online/Offline Signature Schemes
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Shamir, A., Tauman, Y.: Improved Online/Offline Signature Schemes. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 355-367. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 355-367
-
-
Shamir, A.1
Tauman, Y.2
-
45
-
-
79960862322
-
Secure and practical outsourcing of linear programming in cloud computing
-
Wang, C., Ren, K., Wang, J.: Secure and practical outsourcing of linear programming in cloud computing. In: Proceedings of the 30th IEEE International Conference on Computer Communications (INFOCOM), pp. 820-828 (2011)
-
(2011)
Proceedings of the 30th IEEE International Conference on Computer Communications (INFOCOM)
, pp. 820-828
-
-
Wang, C.1
Ren, K.2
Wang, J.3
-
46
-
-
57049172488
-
Server-Aided Verification Signatures: Definitions and New Constructions
-
Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. Springer, Heidelberg
-
Wu, W., Mu, Y., Susilo, W., Huang, X.: Server-Aided Verification Signatures: Definitions and New Constructions. In: Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. LNCS, vol. 5324, pp. 141-155. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5324
, pp. 141-155
-
-
Wu, W.1
Mu, Y.2
Susilo, W.3
Huang, X.4
|