Practical Covert Authentication (Englisch)
- Neue Suche nach: Jarecki, S.
- Neue Suche nach: Jarecki, S.
- Neue Suche nach: Krawczyk, Hugo
In:
Public-key cryptography - PKC 2014: 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014 : proceedings /
8383
;
611-629
;
2014
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Practical Covert Authentication
-
Beteiligte:Jarecki, S. ( Autor:in ) / Krawczyk, Hugo
-
Kongress:Internaional conference; 17th, Public-key cryptography - PKC 2014: 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014 : proceedings / ; 2014 ; Buenos Aires
-
Erschienen in:LECTURE NOTES IN COMPUTER SCIENCE , 8383 ; 611-629
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Heidelberg
-
Erscheinungsdatum:01.01.2014
-
Format / Umfang:19 pages
-
Anmerkungen:Includes bibliographical references and index.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Simple Chosen-Ciphertext Security from Low-Noise LPNKiltz, E. / Masny, D. / Pietrzak, K. et al. | 2014
- 19
-
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of PairingQin, B. / Liu, S. et al. | 2014
- 37
-
A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption SchemeDachman-Soled, D. et al. | 2014
- 56
-
Chosen Ciphertext Security via UCEMatsuda, T. / Hanaoka, G. et al. | 2014
- 77
-
Proxy Re-encryption from LatticesKrishanova, E. et al. | 2014
- 95
-
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from LatticesChandran, N. / Chase, M. / Liu, F.-H. / Nishimaki, R. / Xagawa, K. et al. | 2014
- 113
-
Verifiable Set Operations over Outsourced DatabasesCanetti, R. / Paneth, O. / Papadopoulos, D. / Triandopoulos, N. et al. | 2014
- 131
-
Verifiable Oblivious StorageApon, D. / Katz, J. / Shi, E. / Thiruvengadam, A. et al. | 2014
- 149
-
Achieving Privacy in Verifiable Computation with Multiple Servers - Without FHE and without Pre-processingAnanth, P. / Chandran, N. / Goyal, V. / Kanukurthi, B. / Ostrovsky, R. et al. | 2014
- 167
-
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly SettingCanard, S. / Pointcheval, D. / Sanders, O. et al. | 2014
- 185
-
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial CongruencesBi, J. / Coron, J.-S. / Faugere, J.-C. / Nguyen, P.Q. / Renault, G. / Zeitoun, R. et al. | 2014
- 203
-
Elliptic and Hyperelliptic Curves: A Practical Security AnalysisBos, J.W. / Costello, c. / Miele, A. et al. | 2014
- 221
-
Discrete Logarithm in GF(2^8^0^9) with FFSBarbulescu, R. / Bouvier, C. / Detrey, J. / Gaudry, P. / Jeljeli, H. / Thome, E. / Videau, M. / Zimmermann, P. et al. | 2014
- 239
-
Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and ImplicationsEscala, A. / Herranz, J. / Libert, B. / Rafols, C. et al. | 2014
- 257
-
Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short CiphertextsTessaro, S. / Wilson, D.A. et al. | 2014
- 275
-
A Framework and Compact Constructions for Non-monotonic Attribute-Based EncryptionYamada, S. / Attrapadung, N. / Hanaoka, G. / Kunihiro, N. et al. | 2014
- 293
-
Online/Offline Attribute-Based EncryptionHohenberger, S. / Waters, B. et al. | 2014
- 311
-
Scale-Invariant Fully Homomorphic Encryption over the IntegersCoron, J.-S. / Leopint, T. / Tibouchi, M. et al. | 2014
- 329
-
Enhanced Chosen-Ciphertext Security and ApplicationsDachman-Soled, D. / Fuchsbauer, G. / Mohassel, P. / O Neill, A. et al. | 2014
- 345
-
Lattice-Based Group Signature Scheme with Verifier-Local RevocationLanglois, A. / Ling, S. / Nguyen, K. / Wang, H. et al. | 2014
- 362
-
Leakage-Resilient Signatures with Graceful DegradationNielsen, J.B. / Venturi, D. / Zottarel, A. et al. | 2014
- 380
-
On the Lossiness of the Rabin Trapdoor FunctionSeurin, Y. et al. | 2014
- 399
-
Solving Random Subset Sum Problem by l~p-norm SVP OracleHu, G. / Pan, Y. / Zhang, F. et al. | 2014
- 411
-
Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal LatticeIshiguro, T. / Kiyomoto, S. / Miyake, Y. / Takagi, T. et al. | 2014
- 429
-
Lazy Modulus Switching for the BKW Algorithm on LWEAlbrecht, M.R. / Faugere, J.-C. / Fitzpatrick, R. / Perret, L. et al. | 2014
- 446
-
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic AssumptionsAlbrecht, M.R. / Faugere, J.-C. / Fitzpatrick, R. / Perret, L. / Todo, Y. / Xagawa, K. et al. | 2014
- 465
-
Related Randomness Attacks for Public Key EncryptionPaterson, K.G. / Schuldt, J.C.N. / Sibborn, D.L. et al. | 2014
- 483
-
Encryption Schemes Secure under Related-Key and Key-Dependent Message AttacksBohl, F. / Davies, G.T. / Hofheinz, D. et al. | 2014
- 501
-
Functional Signatures and Pseudorandom FunctionsBoyle, E. / Goldwasser, S. / Ivan, I. et al. | 2014
- 520
-
Policy-Based SignaturesBellare, M. / Fuchsbauer, G. et al. | 2014
- 538
-
Generalizing Homomorphic MACs for Arithmetic CircuitsCatalano, D. / Fiore, D. / Gennaro, R. / Nizzardo, L. et al. | 2014
- 556
-
General Impossibility of Group Homomorphic Encryption in the Quantum WorldArmknecht, F. / Gagliardoni, T. / Katzenbeisser, S. / Peter, A. et al. | 2014
- 574
-
On Minimal Assumptions for Sender-Deniable Public Key EncryptionDachman-Soled, D. et al. | 2014
- 592
-
Traceable Group EncryptionLibert, B. / Yung, M. / Joye, M. / Peters, T. et al. | 2014
- 611
-
Practical Covert AuthenticationJarecki, S. et al. | 2014
- 630
-
Fine-Tuning Groth-Sahai ProofsEscala, A. / Groth, J. et al. | 2014
- 650
-
Cross-Domain Secure ComputationCho, C. / Garg, S. / Ostrovsky, R. et al. | 2014
- 669
-
On the Security of the Pre-shared Key Ciphersuites of TLSLi, Y. / Schage, S. / Yang, Z. / Kohlar, F. / Schwenk, J. et al. | 2014