메뉴 건너뛰기




Volumn 8042 LNCS, Issue PART 1, 2013, Pages 449-475

New techniques for SPHFs and efficient one-round PAKE protocols

Author keywords

[No Author keywords available]

Indexed keywords

BLIND SIGNATURES; CIPHERTEXTS; EXTRACTABILITY; NON-INTERACTIVE ZERO-KNOWLEDGE; PASSWORD AUTHENTICATED KEY EXCHANGES (PAKE); SECURITY PROOFS; SMOOTH PROJECTIVE HASH FUNCTIONS; ZERO KNOWLEDGE PROOF;

EID: 84884471298     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-40041-4_25     Document Type: Conference Paper
Times cited : (96)

References (29)
  • 1
    • 70350302872 scopus 로고    scopus 로고
    • Smooth projective hashing for conditionally extractable commitments
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Abdalla, M., Chevalier, C., Pointcheval, D.: Smooth projective hashing for conditionally extractable commitments. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 671-689. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 671-689
    • Abdalla, M.1    Chevalier, C.2    Pointcheval, D.3
  • 2
    • 0842283854 scopus 로고    scopus 로고
    • Randomness Re-use in Multi-recipient Encryption Schemes
    • Public Key Cryptography - PKC 2003
    • Bellare, M., Boldyreva, A., Staddon, J.: Randomness re-use in multi-recipient encryption schemeas. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 85-99. Springer, Heidelberg (2002) (Pubitemid 36137130)
    • (2002) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2567 , pp. 85-99
    • Bellare, M.1    Boldyreva, A.2    Staddon, J.3
  • 3
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
    • Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 4
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attacks
    • IEEE Computer Society Press May
    • Bellovin, S.M., Merritt, M.: Encrypted key exchange: Password-based protocols secure against dictionary attacks. In: 1992 IEEE Symposium on Security and Privacy, pp. 72-84. IEEE Computer Society Press (May 1992)
    • (1992) 1992 IEEE Symposium on Security and Privacy , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 5
    • 84873940531 scopus 로고    scopus 로고
    • Efficient UC-secure authenticated key-exchange for algebraic languages
    • Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. Springer, Heidelberg
    • Ben Hamouda, F., Blazy, O., Chevalier, C., Pointcheval, D., Vergnaud, D.: Efficient UC-secure authenticated key-exchange for algebraic languages. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 272-291. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7778 , pp. 272-291
    • Ben Hamouda, F.1    Blazy, O.2    Chevalier, C.3    Pointcheval, D.4    Vergnaud, D.5
  • 7
    • 84884479067 scopus 로고    scopus 로고
    • Trapdoor smooth projective hash functions
    • Report 2013/341
    • Benhamouda, F., Pointcheval, D.: Trapdoor smooth projective hash functions. Cryptology ePrint Archive, Report 2013/341 (2013), http://eprint.iacr.org/
    • (2013) Cryptology ePrint Archive
    • Benhamouda, F.1    Pointcheval, D.2
  • 8
    • 79952504693 scopus 로고    scopus 로고
    • Signatures on randomizable ciphertexts
    • Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
    • Blazy, O., Fuchsbauer, G., Pointcheval, D., Vergnaud, D.: Signatures on randomizable ciphertexts. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 403-422. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6571 , pp. 403-422
    • Blazy, O.1    Fuchsbauer, G.2    Pointcheval, D.3    Vergnaud, D.4
  • 9
    • 84858299538 scopus 로고    scopus 로고
    • Round-optimal privacy-preserving protocols with smooth projective hash functions
    • Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
    • Blazy, O., Pointcheval, D., Vergnaud, D.: Round-optimal privacy-preserving protocols with smooth projective hash functions. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 94-111. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7194 , pp. 94-111
    • Blazy, O.1    Pointcheval, D.2    Vergnaud, D.3
  • 10
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 11
    • 77956987281 scopus 로고    scopus 로고
    • Credential authenticated identification and key exchange
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Camenisch, J., Casati, N., Gross, T., Shoup, V.: Credential authenticated identification and key exchange. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 255-276. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 255-276
    • Camenisch, J.1    Casati, N.2    Gross, T.3    Shoup, V.4
  • 12
    • 82955184601 scopus 로고    scopus 로고
    • A framework for practical universally composable zero-knowledge protocols
    • Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. Springer, Heidelberg
    • Camenisch, J., Krenn, S., Shoup, V.: A framework for practical universally composable zero-knowledge protocols. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 449-467. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.7073 , pp. 449-467
    • Camenisch, J.1    Krenn, S.2    Shoup, V.3
  • 13
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • IEEE Computer Society Press October
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: 42nd Annual Symposium on Foundations of Computer Science, pp. 136-145. IEEE Computer Society Press (October 2001)
    • (2001) 42nd Annual Symposium on Foundations of Computer Science , pp. 136-145
    • Canetti, R.1
  • 14
    • 24944566824 scopus 로고    scopus 로고
    • Universally composable password-based key exchange
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Canetti, R., Halevi, S., Katz, J., Lindell, Y., MacKenzie, P.: Universally composable password-based key exchange. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 404-421. Springer, Heidelberg (2005) (Pubitemid 41313966)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 404-421
    • Canetti, R.1    Halevi, S.2    Katz, J.3    Lindell, Y.4    MacKenzie, P.5
  • 15
    • 84870707379 scopus 로고    scopus 로고
    • A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
    • Advances in Cryptology - CRYPTO '98
    • Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998) (Pubitemid 128118994)
    • (1998) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 16
    • 84947267092 scopus 로고    scopus 로고
    • Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
    • Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 45-64
    • Cramer, R.1    Shoup, V.2
  • 18
    • 32844472758 scopus 로고    scopus 로고
    • Strengthening zero-knowledge protocols using signatures
    • Garay, J.A., MacKenzie, P.D., Yang, K.: Strengthening zero-knowledge protocols using signatures. Journal of Cryptology 19(2), 169-209 (2006)
    • (2006) Journal of Cryptology , vol.19 , Issue.2 , pp. 169-209
    • Garay, J.A.1    MacKenzie, P.D.2    Yang, K.3
  • 19
    • 84873970560 scopus 로고    scopus 로고
    • Candidate multilinear maps from ideal lattices and applications
    • Report 2012/610
    • Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices and applications. Cryptology ePrint Archive, Report 2012/610 (2012), http://eprint.iacr.org/
    • (2012) Cryptology ePrint Archive
    • Garg, S.1    Gentry, C.2    Halevi, S.3
  • 20
    • 35248830706 scopus 로고    scopus 로고
    • A framework for password-based authenticated key exchange
    • Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
    • Gennaro, R., Lindell, Y.: A framework for password-based authenticated key exchange. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 524-543. Springer, Heidelberg (2003), http://eprint.iacr.org/2003/032.ps.gz
    • (2003) LNCS , vol.2656 , pp. 524-543
    • Gennaro, R.1    Lindell, Y.2
  • 22
    • 84861673398 scopus 로고    scopus 로고
    • Relatively-sound nIZKs and password-based key-exchange
    • Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. Springer, Heidelberg
    • Jutla, C., Roy, A.: Relatively-sound nIZKs and password-based key-exchange. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 485-503. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7293 , pp. 485-503
    • Jutla, C.1    Roy, A.2
  • 23
    • 84945132563 scopus 로고    scopus 로고
    • Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • Katz, J., Ostrovsky, R., Yung, M.: Efficient password-authenticated key exchange using human-memorable passwords. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 475-494. Springer, Heidelberg (2001) (Pubitemid 33275849)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2045 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 24
    • 79953207657 scopus 로고    scopus 로고
    • Round-optimal password-based authenticated key exchange
    • Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
    • Katz, J., Vaikuntanathan, V.: Round-optimal password-based authenticated key exchange. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 293-310. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6597 , pp. 293-310
    • Katz, J.1    Vaikuntanathan, V.2
  • 25
    • 84858324813 scopus 로고    scopus 로고
    • Non-interactive CCA-secure threshold cryptosystems with adaptive security: New framework and constructions
    • Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
    • Libert, B., Yung, M.: Non-interactive CCA-secure threshold cryptosystems with adaptive security: New framework and constructions. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 75-93. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7194 , pp. 75-93
    • Libert, B.1    Yung, M.2
  • 26
    • 0024983231 scopus 로고
    • Public-key cryptosystems provably secure against chosen ciphertext attacks
    • ACM Press May
    • Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: 22nd Annual ACM Symposium on Theory of Computing. ACM Press (May 1990)
    • (1990) 22nd Annual ACM Symposium on Theory of Computing
    • Naor, M.1    Yung, M.2
  • 27
    • 84861657933 scopus 로고    scopus 로고
    • Password-based authenticated key exchange (invited talk)
    • Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. Springer, Heidelberg
    • Pointcheval, D.: Password-based authenticated key exchange (invited talk). In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 390-397. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7293 , pp. 390-397
    • Pointcheval, D.1
  • 28
    • 0033342534 scopus 로고    scopus 로고
    • Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security
    • IEEE Computer Society Press October
    • Sahai, A.: Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security. In: 40th Annual Symposium on Foundations of Computer Science, pp. 543-553. IEEE Computer Society Press (October 1999)
    • (1999) 40th Annual Symposium on Foundations of Computer Science , pp. 543-553
    • Sahai, A.1
  • 29
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 114-127
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.