Functional Signatures and Pseudorandom Functions (Englisch)
Freier Zugriff
- Neue Suche nach: Boyle, Elette
- Neue Suche nach: Goldwasser, Shafi
- Neue Suche nach: Ivan, Ioana
- Neue Suche nach: Boyle, Elette
- Neue Suche nach: Goldwasser, Shafi
- Neue Suche nach: Ivan, Ioana
In:
Public-Key Cryptography – PKC 2014
10
;
501-519
;
2014
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Functional Signatures and Pseudorandom Functions
-
Beteiligte:
-
Erschienen in:Public-Key Cryptography – PKC 2014 , 10 ; 501-519Lecture Notes in Computer Science ; 8383, 10 ; 501-519
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2014
-
Format / Umfang:19 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Simple Chosen-Ciphertext Security from Low-Noise LPNKiltz, Eike / Masny, Daniel / Pietrzak, Krzysztof et al. | 2014
- 19
-
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of PairingQin, Baodong / Liu, Shengli et al. | 2014
- 37
-
A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption SchemeDachman-Soled, Dana et al. | 2014
- 56
-
Chosen Ciphertext Security via UCEMatsuda, Takahiro / Hanaoka, Goichiro et al. | 2014
- 77
-
Proxy Re-encryption from LatticesKirshanova, Elena et al. | 2014
- 95
-
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from LatticesChandran, Nishanth / Chase, Melissa / Liu, Feng-Hao / Nishimaki, Ryo / Xagawa, Keita et al. | 2014
- 113
-
Verifiable Set Operations over Outsourced DatabasesCanetti, Ran / Paneth, Omer / Papadopoulos, Dimitrios / Triandopoulos, Nikos et al. | 2014
- 131
-
Verifiable Oblivious StorageApon, Daniel / Katz, Jonathan / Shi, Elaine / Thiruvengadam, Aishwarya et al. | 2014
- 149
-
Achieving Privacy in Verifiable Computation with Multiple Servers – Without FHE and without Pre-processingAnanth, Prabhanjan / Chandran, Nishanth / Goyal, Vipul / Kanukurthi, Bhavana / Ostrovsky, Rafail et al. | 2014
- 167
-
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly SettingCanard, Sébastien / Pointcheval, David / Sanders, Olivier et al. | 2014
- 185
-
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial CongruencesBi, Jingguo / Coron, Jean-Sébastien / Faugère, Jean-Charles / Nguyen, Phong Q. / Renault, Guénaël / Zeitoun, Rina et al. | 2014
- 203
-
Elliptic and Hyperelliptic Curves: A Practical Security AnalysisBos, Joppe W. / Costello, Craig / Miele, Andrea et al. | 2014
- 221
-
Discrete Logarithm in GF(2809) with FFSBarbulescu, Razvan / Bouvier, Cyril / Detrey, Jérémie / Gaudry, Pierrick / Jeljeli, Hamza / Thomé, Emmanuel / Videau, Marion / Zimmermann, Paul et al. | 2014
- 239
-
Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and ImplicationsEscala, Alex / Herranz, Javier / Libert, Benoît / Ràfols, Carla et al. | 2014
- 257
-
Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short CiphertextsTessaro, Stefano / Wilson, David A. et al. | 2014
- 275
-
A Framework and Compact Constructions for Non-monotonic Attribute-Based EncryptionYamada, Shota / Attrapadung, Nuttapong / Hanaoka, Goichiro / Kunihiro, Noboru et al. | 2014
- 293
-
Online/Offline Attribute-Based EncryptionHohenberger, Susan / Waters, Brent et al. | 2014
- 311
-
Scale-Invariant Fully Homomorphic Encryption over the IntegersCoron, Jean-Sébastien / Lepoint, Tancrède / Tibouchi, Mehdi et al. | 2014
- 329
-
Enhanced Chosen-Ciphertext Security and ApplicationsDachman-Soled, Dana / Fuchsbauer, Georg / Mohassel, Payman / O’Neill, Adam et al. | 2014
- 345
-
Lattice-Based Group Signature Scheme with Verifier-Local RevocationLanglois, Adeline / Ling, San / Nguyen, Khoa / Wang, Huaxiong et al. | 2014
- 362
-
Leakage-Resilient Signatures with Graceful DegradationNielsen, Jesper Buus / Venturi, Daniele / Zottarel, Angela et al. | 2014
- 380
-
On the Lossiness of the Rabin Trapdoor FunctionSeurin, Yannick et al. | 2014
- 399
-
Solving Random Subset Sum Problem by l p -norm SVP OracleHu, Gengran / Pan, Yanbin / Zhang, Feng et al. | 2014
- 411
-
Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal LatticeIshiguro, Tsukasa / Kiyomoto, Shinsaku / Miyake, Yutaka / Takagi, Tsuyoshi et al. | 2014
- 429
-
Lazy Modulus Switching for the BKW Algorithm on LWEAlbrecht, Martin R. / Faugère, Jean-Charles / Fitzpatrick, Robert / Perret, Ludovic et al. | 2014
- 446
-
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic AssumptionsAlbrecht, Martin R. / Faugére, Jean-Charles / Fitzpatrick, Robert / Perret, Ludovic / Todo, Yosuke / Xagawa, Keita et al. | 2014
- 465
-
Related Randomness Attacks for Public Key EncryptionPaterson, Kenneth G. / Schuldt, Jacob C. N. / Sibborn, Dale L. et al. | 2014
- 483
-
Encryption Schemes Secure under Related-Key and Key-Dependent Message AttacksBöhl, Florian / Davies, Gareth T. / Hofheinz, Dennis et al. | 2014
- 501
-
Functional Signatures and Pseudorandom FunctionsBoyle, Elette / Goldwasser, Shafi / Ivan, Ioana et al. | 2014
- 520
-
Policy-Based SignaturesBellare, Mihir / Fuchsbauer, Georg et al. | 2014
- 538
-
Generalizing Homomorphic MACs for Arithmetic CircuitsCatalano, Dario / Fiore, Dario / Gennaro, Rosario / Nizzardo, Luca et al. | 2014
- 556
-
General Impossibility of Group Homomorphic Encryption in the Quantum WorldArmknecht, Frederik / Gagliardoni, Tommaso / Katzenbeisser, Stefan / Peter, Andreas et al. | 2014
- 574
-
On Minimal Assumptions for Sender-Deniable Public Key EncryptionDachman-Soled, Dana et al. | 2014
- 592
-
Traceable Group EncryptionLibert, Benoît / Yung, Moti / Joye, Marc / Peters, Thomas et al. | 2014
- 611
-
Practical Covert AuthenticationJarecki, Stanislaw et al. | 2014
- 630
-
Fine-Tuning Groth-Sahai ProofsEscala, Alex / Groth, Jens et al. | 2014
- 650
-
Cross-Domain Secure ComputationCho, Chongwon / Garg, Sanjam / Ostrovsky, Rafail et al. | 2014
- 669
-
On the Security of the Pre-shared Key Ciphersuites of TLSLi, Yong / Schäge, Sven / Yang, Zheng / Kohlar, Florian / Schwenk, Jörg et al. | 2014