-
1
-
-
84861657923
-
Functional encryption for threshold functions (or fuzzy IBE) from lattices
-
Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. Springer, Heidelberg
-
Agrawal, S., Boyen, X., Vaikuntanathan, V., Voulgaris, P., Wee, H.: Functional encryption for threshold functions (or fuzzy IBE) from lattices. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 280-297. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7293
, pp. 280-297
-
-
Agrawal, S.1
Boyen, X.2
Vaikuntanathan, V.3
Voulgaris, P.4
Wee, H.5
-
2
-
-
83055162353
-
Functional encryption for inner product predicates from learning with errors
-
Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. Springer, Heidelberg
-
Agrawal, S., Freeman, D.M., Vaikuntanathan, V.: Functional encryption for inner product predicates from learning with errors. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 21-40. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7073
, pp. 21-40
-
-
Agrawal, S.1
Freeman, D.M.2
Vaikuntanathan, V.3
-
3
-
-
80053054006
-
Efficient selective identity-based encryption without random oracles
-
Boneh, D., Boyen, X.: Efficient selective identity-based encryption without random oracles. J. Cryptology 24(4), 659-693 (2011)
-
(2011)
J. Cryptology
, vol.24
, Issue.4
, pp. 659-693
-
-
Boneh, D.1
Boyen, X.2
-
4
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
84873954709
-
On the semantic security of functional encryption schemes
-
Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. Springer, Heidelberg
-
Barbosa, M., Farshim, P.: On the semantic security of functional encryption schemes. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 143-161. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7778
, pp. 143-161
-
-
Barbosa, M.1
Farshim, P.2
-
6
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
ACM, New York
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, STOC 1988, pp. 1-10. ACM, New York (1988)
-
(1988)
Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, STOC 1988
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
7
-
-
38049061524
-
On the Necessity of Rewinding in Secure Multiparty Computation
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Backes, M., Müller-Quade, J., Unruh, D.: On the Necessity of Rewinding in Secure Multiparty Computation. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 157-173. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 157-173
-
-
Backes, M.1
Müller-Quade, J.2
Unruh, D.3
-
8
-
-
0025137207
-
The round complexity of secure protocols
-
extended abstract
-
Beaver, D., Micali, S., Rogaway, P.: The round complexity of secure protocols (extended abstract). In: STOC, pp. 503-513 (1990)
-
(1990)
STOC
, pp. 503-513
-
-
Beaver, D.1
Micali, S.2
Rogaway, P.3
-
9
-
-
84873974883
-
Semantically-secure functional encryption: Possibility results, impossibility results and the quest for a general definition
-
Report 2012/515
-
Bellare, M., O'Neill, A.: Semantically-secure functional encryption: Possibility results, impossibility results and the quest for a general definition. Cryptology ePrint Archive, Report 2012/515 (2012)
-
(2012)
Cryptology ePrint Archive
-
-
Bellare, M.1
O'Neill, A.2
-
10
-
-
33748619223
-
How to play almost any mental game over the net - Concurrent composition via super-polynomial simulation
-
Barak, B., Sahai, A.: How to play almost any mental game over the net - concurrent composition via super-polynomial simulation. In: FOCS, pp. 543-552 (2005)
-
(2005)
FOCS
, pp. 543-552
-
-
Barak, B.1
Sahai, A.2
-
11
-
-
79953230454
-
Functional encryption: Definitions and challenges
-
Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
-
Boneh, D., Sahai, A., Waters, B.: Functional encryption: Definitions and challenges. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 253-273. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6597
, pp. 253-273
-
-
Boneh, D.1
Sahai, A.2
Waters, B.3
-
12
-
-
33749573228
-
Anonymous hierarchical identity-based encryption (Without random oracles)
-
Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings
-
Boyen, X., Waters, B.: Anonymous hierarchical identity-based encryption (Without random oracles). In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 290-307. Springer, Heidelberg (2006) (Pubitemid 44532122)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4117 LNCS
, pp. 290-307
-
-
Boyen, X.1
Waters, B.2
-
13
-
-
35248897599
-
A forward-secure public-key encryption scheme
-
Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
-
Canetti, R., Halevi, S., Katz, J.: A forward-secure public-key encryption scheme. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 255-271. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 255-271
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
14
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Cocks, C.: An identity based encryption scheme based on quadratic residues. IMA Int. Conf., 360-363 (2001)
-
(2001)
IMA Int. Conf.
, pp. 360-363
-
-
Cocks, C.1
-
15
-
-
84947254092
-
Key-insulated public key cryptosystems
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
-
Dodis, Y., Katz, J., Xu, S., Yung, M.: Key-insulated public key cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 65-82. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 65-82
-
-
Dodis, Y.1
Katz, J.2
Xu, S.3
Yung, M.4
-
16
-
-
0024984004
-
Witness indistinguishable and witness hiding protocols
-
Feige, U., Shamir, A.: Witness indistinguishable and witness hiding protocols. In: STOC, pp. 416-426 (1990)
-
(1990)
STOC
, pp. 416-426
-
-
Feige, U.1
Shamir, A.2
-
17
-
-
84884481521
-
Attribute-based encryption for circuits from multilinear maps
-
Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
-
Garg, S., Gentry, C., Halevi, S., Sahai, A., Waters, B.: Attribute-based encryption for circuits from multilinear maps. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 479-499. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8043
, pp. 479-499
-
-
Garg, S.1
Gentry, C.2
Halevi, S.3
Sahai, A.4
Waters, B.5
-
18
-
-
0022793132
-
How to construct random functions
-
Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM 33(4), 792-807 (1986)
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
19
-
-
33748600953
-
On the impossibility of obfuscation with auxiliary input
-
Goldwasser, S., Kalai, Y.T.: On the impossibility of obfuscation with auxiliary input. In: FOCS, pp. 553-562 (2005)
-
(2005)
FOCS
, pp. 553-562
-
-
Goldwasser, S.1
Kalai, Y.T.2
-
20
-
-
84883367708
-
Succinct functional encryption and its power: Reusable garbled circuits and beyond
-
to appear
-
Goldwasser, S., Kalai, Y.T., Popa, R.A., Vaikuntanathan, V., Zeldovich, N.: Succinct functional encryption and its power: Reusable garbled circuits and beyond. In: STOC (to appear, 2013)
-
(2013)
STOC
-
-
Goldwasser, S.1
Kalai, Y.T.2
Popa, R.A.3
Vaikuntanathan, V.4
Zeldovich, N.5
-
21
-
-
84858314370
-
Bounded-collusion IBE from key homomorphism
-
Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
-
Goldwasser, S., Lewko, A., Wilson, D.A.: Bounded-collusion IBE from key homomorphism. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 564-581. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7194
, pp. 564-581
-
-
Goldwasser, S.1
Lewko, A.2
Wilson, D.A.3
-
22
-
-
85050160774
-
Probabilistic encryption and how to play mental poker keeping secret all partial information
-
Goldwasser, S., Micali, S.: Probabilistic encryption and how to play mental poker keeping secret all partial information. In: STOC, pp. 365-377 (1982)
-
(1982)
STOC
, pp. 365-377
-
-
Goldwasser, S.1
Micali, S.2
-
23
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communications Security, pp. 89-98 (2006)
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
24
-
-
84865477351
-
Functional encryption with bounded collusions via multi-party computation
-
Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. Springer, Heidelberg
-
Gorbunov, S., Vaikuntanathan, V., Wee, H.: Functional encryption with bounded collusions via multi-party computation. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 162-179. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7417
, pp. 162-179
-
-
Gorbunov, S.1
Vaikuntanathan, V.2
Wee, H.3
-
25
-
-
84879825205
-
Attribute-based encryption for circuits
-
ACM, New York
-
Gorbunov, S., Vaikuntanathan, V., Wee, H.: Attribute-based encryption for circuits. In: Proceedings of the 45th Annual ACM Symposium on Symposium on Theory of Computing, STOC 2013, pp. 545-554. ACM, New York (2013)
-
(2013)
Proceedings of the 45th Annual ACM Symposium on Symposium on Theory of Computing, STOC 2013
, pp. 545-554
-
-
Gorbunov, S.1
Vaikuntanathan, V.2
Wee, H.3
-
26
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
Håstad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A pseudorandom generator from any one-way function. SIAM J. Comput. 28(4), 1364-1396 (1999)
-
(1999)
SIAM J. Comput.
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
27
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
DOI 10.1007/978-3-540-78967-3-9, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Katz, J., Sahai, A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 146-162. Springer, Heidelberg (2008) (Pubitemid 351762828)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965 LNCS
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
28
-
-
84884484659
-
Lower bounds and impossibility results for concurrent self composition
-
Lindell, Y.: Lower bounds and impossibility results for concurrent self composition. The Journal of Cryptology (2004)
-
(2004)
The Journal of Cryptology
-
-
Lindell, Y.1
-
29
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (Hierarchical) inner product encryption
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: Attribute-based encryption and (Hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62-91. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
30
-
-
38749151314
-
Input-indistinguishable computation
-
Micali, S., Pass, R., Rosen, A.: Input-indistinguishable computation. In: FOCS, pp. 367-378 (2006)
-
(2006)
FOCS
, pp. 367-378
-
-
Micali, S.1
Pass, R.2
Rosen, A.3
-
31
-
-
79953210180
-
Definitional issues in functional encryption
-
Report 2010/556
-
O'Neill, A.: Definitional issues in functional encryption. Cryptology ePrint Archive, Report 2010/556 (2010), http://eprint.iacr.org/
-
(2010)
Cryptology ePrint Archive
-
-
O'Neill, A.1
-
32
-
-
35248833045
-
Simulation in quasi-polynomial time and its application to protocol composition
-
Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
-
Pass, R.: Simulation in quasi-polynomial time and its application to protocol composition. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 160-176. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 160-176
-
-
Pass, R.1
-
33
-
-
0036957024
-
Concurrent zero knowledge with logarithmic round-complexity
-
Prabhakaran, M., Rosen, A., Sahai, A.: Concurrent zero knowledge with logarithmic round-complexity. In: 43rd FOCS, pp. 366-375 (2002)
-
(2002)
43rd FOCS
, pp. 366-375
-
-
Prabhakaran, M.1
Rosen, A.2
Sahai, A.3
-
34
-
-
84858307151
-
How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption
-
Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
-
Parno, B., Raykova, M., Vaikuntanathan, V.: How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 422-439. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7194
, pp. 422-439
-
-
Parno, B.1
Raykova, M.2
Vaikuntanathan, V.3
-
35
-
-
4544347480
-
New notions of security: Achieving universal composability without trusted setup
-
Prabhakaran, M., Sahai, A.: New notions of security: achieving universal composability without trusted setup. In: STOC, pp. 242-251 (2004)
-
(2004)
STOC
, pp. 242-251
-
-
Prabhakaran, M.1
Sahai, A.2
-
36
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
38
-
-
24944554962
-
Fuzzy identity-based encryption
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Sahai, A.,Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
40
-
-
84873978451
-
Attribute-based encryption for circuits from multilinear maps
-
Report 2012/592
-
Sahai, A., Waters, B.: Attribute-based encryption for circuits from multilinear maps. Cryptology ePrint Archive, Report 2012/592 (2012)
-
(2012)
Cryptology ePrint Archive
-
-
Sahai, A.1
Waters, B.2
-
41
-
-
0022882770
-
How to generate and exchange secrets
-
extended abstract
-
Yao, A.C.-C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162-167 (1986)
-
(1986)
FOCS
, pp. 162-167
-
-
Yao, A.C.-C.1
|