-
1
-
-
33745632083
-
Relations among notions of security for identity based encryption schemes
-
DOI 10.1007/11682462-16, LATIN 2006: Theoretical Informatics - 7th Latin American Symposium, Proceedings
-
Attrapadung, N., Cui, Y., Galindo, D., Hanaoka, G., Hasuo, I., Imai, H., Matsuura, K., Yang, P., Zhang, R.: Relations Among Notions of Security for Identity Based Encryption Schemes. In: Correa, J.R., Hevia, A., Kiwi, M. (eds.) LATIN 2006. LNCS, vol. 3887, pp. 130-141. Springer, Heidelberg (2006) (Pubitemid 43986602)
-
(2006)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3887 LNCS
, pp. 130-141
-
-
Attrapadung, N.1
Cui, Y.2
Galindo, D.3
Hanaoka, G.4
Hasuo, I.5
Imai, H.6
Matsuura, K.7
Yang, P.8
Zhang, R.9
-
2
-
-
84873951093
-
On the semantic security of functional encryption schemes
-
ePrint Archive, Report 2012/474 Full version of this paper
-
Barbosa, M., Farshim, P.: On the semantic security of functional encryption schemes. Cryptology ePrint Archive, Report 2012/474 (2012) Full version of this paper
-
(2012)
Cryptology
-
-
Barbosa, M.1
Farshim, P.2
-
3
-
-
84957629783
-
Relations among Notions of Security for Public-Key Encryption Schemes
-
Advances in Cryptology - CRYPTO '98
-
Bellare,M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among Notions of Security for Public-Key Encryption Schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26-45. Springer, Heidelberg (1998) (Pubitemid 128118995)
-
(1998)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
4
-
-
84873974883
-
Semantically-secure functional encryption: Possibility results, impossibility results and the quest for a general definition
-
ePrint Archive, Report 2012/515
-
Bellare, M., O'Neill, A.: Semantically-secure functional encryption: possibility results, impossibility results and the quest for a general definition. Cryptology ePrint Archive, Report 2012/515 (2012)
-
(2012)
Cryptology
-
-
Bellare, M.1
O'Neill, A.2
-
5
-
-
79953230454
-
Functional Encryption: Definitions and Challenges
-
Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
-
Boneh, D., Sahai, A., Waters, B.: Functional Encryption: Definitions and Challenges. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 253-273. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6597
, pp. 253-273
-
-
Boneh, D.1
Sahai, A.2
Waters, B.3
-
6
-
-
51849137205
-
Trapdoors for hard lattices and new cryptographic constructions
-
Dwork, C. (ed.) ACM
-
Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Dwork, C. (ed.) STOC 2008, pp. 197-206. ACM (2008)
-
(2008)
STOC 2008
, pp. 197-206
-
-
Gentry, C.1
Peikert, C.2
Vaikuntanathan, V.3
-
7
-
-
33645593031
-
The Foundations of Cryptography
-
Cambridge University Press
-
Goldreich, O.: The Foundations of Cryptography. Basic Applications, vol. 2. Cambridge University Press (2004)
-
(2004)
Basic Applications
, vol.2
-
-
Goldreich, O.1
-
9
-
-
84865477351
-
Functional Encryption with Bounded Collusions via Multi-party Computation
-
Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. Springer, Heidelberg
-
Gorbunov, S., Vaikuntanathan, V., Wee, H.: Functional Encryption with Bounded Collusions via Multi-party Computation. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 162-179. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7417
, pp. 162-179
-
-
Gorbunov, S.1
Vaikuntanathan, V.2
Wee, H.3
-
10
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
DOI 10.1007/978-3-540-78967-3-9, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Katz, J., Sahai, A., Waters, B.: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 146-162. Springer, Heidelberg (2008) (Pubitemid 351762828)
-
(2008)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965 LNCS
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
11
-
-
84859986507
-
Lattice Signatures without Trapdoors
-
Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. Springer, Heidelberg
-
Lyubashevsky, V.: Lattice Signatures without Trapdoors. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 738-755. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7237
, pp. 738-755
-
-
Lyubashevsky, V.1
-
12
-
-
38749097694
-
Worst-case to average-case reductions based on gaussian measures
-
Micciancio, D., Regev, O.: Worst-case to average-case reductions based on gaussian measures. SIAM Journal on Computing 37(1), 267-302 (2007)
-
(2007)
SIAM Journal on Computing
, vol.37
, Issue.1
, pp. 267-302
-
-
Micciancio, D.1
Regev, O.2
-
13
-
-
84937420653
-
Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case
-
Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
-
Nielsen, J.B.: Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 111-126. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 111-126
-
-
Nielsen, J.B.1
-
14
-
-
79953210180
-
Definitional issues in functional encryption
-
ePrint Archive, Report 2010/556
-
O'Neill, A.: Definitional issues in functional encryption. Cryptology ePrint Archive, Report 2010/556 (2010)
-
(2010)
Cryptology
-
-
O'Neill, A.1
-
15
-
-
84865452842
-
Functional Encryption for Regular Languages
-
Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. Springer, Heidelberg
-
Waters, B.: Functional Encryption for Regular Languages. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 218-235. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7417
, pp. 218-235
-
-
Waters, B.1
|