-
1
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg 131, 137
-
Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005) 131, 137
-
(2005)
LNCS
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
2
-
-
35048887476
-
Short group signatures
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg 130, 138
-
Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004) 130, 138
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
3
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg 130
-
Boneh, D., Franklin,M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001) 130
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
78650021967
-
Algebraic pseudorandom functions with improved efficiency from the augmented cascade
-
Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM Press October 130, 133
-
Boneh, D., Montgomery, H.W., Raghunathan, A.: Algebraic pseudorandom functions with improved efficiency from the augmented cascade. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM CCS 2010, pp. 131-140. ACM Press (October 2010) 130, 133
-
(2010)
ACM CCS 2010
, pp. 131-140
-
-
Boneh, D.1
Montgomery, H.W.2
Raghunathan, A.3
-
5
-
-
33746104815
-
Fully collusion resistant traitor tracing with short ciphertexts and private keys
-
Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg 132, 138
-
Boneh, D., Sahai, A., Waters, B.: Fully collusion resistant traitor tracing with short ciphertexts and private keys. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 573-592. Springer, Heidelberg (2006) 132, 138
-
(2006)
LNCS
, vol.4004
, pp. 573-592
-
-
Boneh, D.1
Sahai, A.2
Waters, B.3
-
6
-
-
52149104493
-
The uber-assumption family: A unified complexity framework for bilinear groups
-
Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. Springer, Heidelberg 131, 137
-
Boyen, X.: The uber-assumption family: A unified complexity framework for bilinear groups. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 39-56. Springer, Heidelberg (2008) 131, 137
-
(2008)
LNCS
, vol.5209
, pp. 39-56
-
-
Boyen, X.1
-
7
-
-
67650691588
-
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg 134, 145
-
Camenisch, J., Chandran, N., Shoup, V.: A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 351-368. Springer, Heidelberg (2009) 134, 145
-
(2009)
LNCS
, vol.5479
, pp. 351-368
-
-
Camenisch, J.1
Chandran, N.2
Shoup, V.3
-
8
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Krawczyk, H. (ed.) CRYPTO 1998. Springer, Heidelberg 130
-
Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998) 130
-
(1998)
LNCS
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
9
-
-
84947267092
-
Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg 130, 133
-
Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002) 130, 133
-
(2002)
LNCS
, vol.2332
, pp. 45-64
-
-
Cramer, R.1
Shoup, V.2
-
10
-
-
78751485079
-
Cryptography against continuous memory attacks
-
IEEE Computer Society Press October 134, 145
-
Dodis, Y., Haralambiev, K., López-Alt, A., Wichs, D.: Cryptography against continuous memory attacks. In: 51st FOCS, pp. 511-520. IEEE Computer Society Press (October 2010) 134, 145
-
(2010)
51st FOCS
, pp. 511-520
-
-
Dodis, Y.1
Haralambiev, K.2
López-Alt, A.3
Wichs, D.4
-
11
-
-
78650817944
-
Efficient public-key cryptography in the presence of key leakage
-
Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg 134
-
Dodis, Y., Haralambiev, K., López-Alt, A., Wichs, D.: Efficient public-key cryptography in the presence of key leakage. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 613-631. Springer, Heidelberg (2010) 134
-
(2010)
LNCS
, vol.6477
, pp. 613-631
-
-
Dodis, Y.1
Haralambiev, K.2
López-Alt, A.3
Wichs, D.4
-
12
-
-
84884471864
-
An algebraic framework for diffie-hellman assumptions
-
132, 136, 137, 139, 141, 142, 143, 144
-
Escala, A., Herold, G., Kiltz, E., Ràfols, C., Villar, J.: An algebraic framework for diffie-hellman assumptions. Cryptology ePrint Archive (2013), http://eprint.iacr.org/ 132, 136, 137, 139, 141, 142, 143, 144
-
(2013)
Cryptology ePrint Archive
-
-
Escala, A.1
Herold, G.2
Kiltz, E.3
Ràfols, C.4
Villar, J.5
-
13
-
-
82955177078
-
Non-interactive and re-usable universally composable string commitments with adaptive security
-
Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. Springer, Heidelberg 134
-
Fischlin, M., Libert, B., Manulis, M.: Non-interactive and re-usable universally composable string commitments with adaptive security. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 468-485. Springer, Heidelberg (2011) 134
-
(2011)
LNCS
, vol.7073
, pp. 468-485
-
-
Fischlin, M.1
Libert, B.2
Manulis, M.3
-
14
-
-
77954639466
-
Converting pairing-based cryptosystems from composite-order groups to prime-order groups
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg 130, 132
-
Freeman, D.M.: Converting pairing-based cryptosystems from composite-order groups to prime-order groups. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 44-61. Springer, Heidelberg (2010) 130, 132
-
(2010)
LNCS
, vol.6110
, pp. 44-61
-
-
Freeman, D.M.1
-
15
-
-
84865578167
-
Identity-based encryption with master key-dependent message security and leakage-resilience
-
Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. Springer, Heidelberg 132
-
Galindo, D., Herranz, J., Villar, J.: Identity-based encryption with master key-dependent message security and leakage-resilience. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 627-642. Springer, Heidelberg (2012) 132
-
(2012)
LNCS
, vol.7459
, pp. 627-642
-
-
Galindo, D.1
Herranz, J.2
Villar, J.3
-
16
-
-
35248830706
-
A framework for password-based authenticated key exchange
-
Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg 130
-
Gennaro, R., Lindell, Y.: A framework for password-based authenticated key exchange. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 524-543. Springer, Heidelberg (2003), http://eprint.iacr.org/2003/032.ps.gz 130
-
(2003)
LNCS
, vol.2656
, pp. 524-543
-
-
Gennaro, R.1
Lindell, Y.2
-
17
-
-
44449140946
-
Efficient non-interactive proof systems for bilinear groups
-
Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg 130, 133, 141, 142
-
Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415-432. Springer, Heidelberg (2008) 130, 133, 141, 142
-
(2008)
LNCS
, vol.4965
, pp. 415-432
-
-
Groth, J.1
Sahai, A.2
-
18
-
-
84865459781
-
Tightly secure signatures and public-key encryption
-
Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. Springer, Heidelberg 134, 145
-
Hofheinz, D., Jager, T.: Tightly secure signatures and public-key encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 590-607. Springer, Heidelberg (2012) 134, 145
-
(2012)
LNCS
, vol.7417
, pp. 590-607
-
-
Hofheinz, D.1
Jager, T.2
-
19
-
-
38049165151
-
Secure hybrid encryption from weakened key encapsulation
-
Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg 130, 138
-
Hofheinz, D., Kiltz, E.: Secure hybrid encryption from weakened key encapsulation. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 553-571. Springer, Heidelberg (2007) 130, 138
-
(2007)
LNCS
, vol.4622
, pp. 553-571
-
-
Hofheinz, D.1
Kiltz, E.2
-
20
-
-
23944461491
-
A one round protocol for tripartite Diffie-Hellman
-
130
-
Joux, A.: A one round protocol for tripartite Diffie-Hellman. Journal of Cryptology 17(4), 263-276 (2004) 130
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 263-276
-
-
Joux, A.1
-
21
-
-
79953207657
-
Round-optimal password-based authenticated key exchange
-
Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg 134, 145
-
Katz, J., Vaikuntanathan, V.: Round-optimal password-based authenticated key exchange. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 293-310. Springer, Heidelberg (2011) 134, 145
-
(2011)
LNCS
, vol.6597
, pp. 293-310
-
-
Katz, J.1
Vaikuntanathan, V.2
-
22
-
-
84974681711
-
A tool box of cryptographic functions related to the Diffie-Hellman function
-
Pandu Rangan, C., Ding, C. (eds.) INDOCRYPT 2001. Springer, Heidelberg 132
-
Kiltz, E.: A tool box of cryptographic functions related to the Diffie-Hellman function. In: Pandu Rangan, C., Ding, C. (eds.) INDOCRYPT 2001. LNCS, vol. 2247, pp. 339-350. Springer, Heidelberg (2001) 132
-
(2001)
LNCS
, vol.2247
, pp. 339-350
-
-
Kiltz, E.1
-
23
-
-
33745574075
-
Chosen-ciphertext security from tag-based encryption
-
Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg 130
-
Kiltz, E.: Chosen-ciphertext security from tag-based encryption. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 581-600. Springer, Heidelberg (2006) 130
-
(2006)
LNCS
, vol.3876
, pp. 581-600
-
-
Kiltz, E.1
-
24
-
-
84859952520
-
Tools for simulating features of composite order bilinear groups in the prime order setting
-
Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. Springer, Heidelberg 131
-
Lewko, A.B.: Tools for simulating features of composite order bilinear groups in the prime order setting. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 318-335. Springer, Heidelberg (2012) 131
-
(2012)
LNCS
, vol.7237
, pp. 318-335
-
-
Lewko, A.B.1
-
25
-
-
84858324813
-
Non-interactive CCA-secure threshold cryptosystems with adaptive security: New framework and constructions
-
Cramer, R. (ed.) TCC 2012. Springer, Heidelberg 134, 143
-
Libert, B., Yung, M.: Non-interactive CCA-secure threshold cryptosystems with adaptive security: New framework and constructions. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 75-93. Springer, Heidelberg (2012) 134, 143
-
(2012)
LNCS
, vol.7194
, pp. 75-93
-
-
Libert, B.1
Yung, M.2
-
26
-
-
0031332843
-
Number-theoretic constructions of efficient pseudo-random functions
-
IEEE Computer Society Press October 130, 133
-
Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudo-random functions. In: 38th FOCS, pp. 458-467. IEEE Computer Society Press (October 1997) 130, 133
-
(1997)
38th FOCS
, pp. 458-467
-
-
Naor, M.1
Reingold, O.2
-
27
-
-
0024983231
-
Public-key cryptosystems provably secure against chosen ciphertext attacks
-
ACM Press May 134
-
Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: 22nd ACM STOC. ACM Press (May 1990) 134
-
(1990)
22nd ACM STOC
-
-
Naor, M.1
Yung, M.2
-
28
-
-
77957011503
-
Fully secure functional encryption with general relations from the decisional linear assumption
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg 131
-
Okamoto, T., Takashima, K.: Fully secure functional encryption with general relations from the decisional linear assumption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 191-208. Springer, Heidelberg (2010) 131
-
(2010)
LNCS
, vol.6223
, pp. 191-208
-
-
Okamoto, T.1
Takashima, K.2
-
29
-
-
38049124394
-
A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants
-
Report 2007/074 130, 138
-
Shacham, H.: A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants. Cryptology ePrint Archive, Report 2007/074 (2007), http://eprint.iacr.org/ 130, 138
-
(2007)
Cryptology ePrint Archive
-
-
Shacham, H.1
-
30
-
-
84871565592
-
Optimal reductions of some decisional problems to the rank problem
-
Wang, X., Sako, K. (eds.) ASIACRYPT 2012. Springer, Heidelberg 132
-
Villar, J.L.: Optimal reductions of some decisional problems to the rank problem. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 80-97. Springer, Heidelberg (2012) 132
-
(2012)
LNCS
, vol.7658
, pp. 80-97
-
-
Villar, J.L.1
|