Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption (Englisch)
- Neue Suche nach: Naccache, David
- Neue Suche nach: Steinwandt, Rainer
- Neue Suche nach: Suárez Corona, Adriana
- Neue Suche nach: Yung, Moti
- Neue Suche nach: Naccache, David
- Neue Suche nach: Steinwandt, Rainer
- Neue Suche nach: Suárez Corona, Adriana
- Neue Suche nach: Yung, Moti
In:
Security and Cryptography for Networks
15
;
598-607
;
2014
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption
-
Beteiligte:Naccache, David ( Autor:in ) / Steinwandt, Rainer ( Autor:in ) / Suárez Corona, Adriana ( Autor:in ) / Yung, Moti ( Autor:in )
-
Erschienen in:Security and Cryptography for Networks , 15 ; 598-607Lecture Notes in Computer Science ; 8642, 15 ; 598-607
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:01.01.2014
-
Format / Umfang:10 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Universally Composable Non-Interactive Key ExchangeFreire, Eduarda S. V. / Hesse, Julia / Hofheinz, Dennis et al. | 2014
- 21
-
Forward Secure Non-Interactive Key ExchangePointcheval, David / Sanders, Olivier et al. | 2014
- 40
-
Secure Key Exchange and Sessions without CredentialsCanetti, Ran / Kolesnikov, Vladimir / Rackoff, Charles / Vahlis, Yevgeniy et al. | 2014
- 57
-
Relaxed Two-to-One Recoding SchemesPandey, Omkant / Ramchen, Kim / Waters, Brent et al. | 2014
- 77
-
Obfuscation ⇒ (IND-CPA Security $\not\Rightarrow$ Circular Security)Marcedone, Antonio / Orlandi, Claudio et al. | 2014
- 91
-
Program Obfuscation via Multilinear MapsGarg, Sanjam et al. | 2014
- 95
-
Constrained Verifiable Random FunctionsFuchsbauer, Georg et al. | 2014
- 115
-
Publicly Evaluable Pseudorandom Functions and Their ApplicationsChen, Yu / Zhang, Zongyang et al. | 2014
- 135
-
On the Classification of Finite Boolean Functions up to FairnessMakriyannis, Nikolaos et al. | 2014
- 155
-
Communication-Efficient MPC for General Adversary StructuresLampkins, Joshua / Ostrovsky, Rafail et al. | 2014
- 175
-
Publicly Auditable Secure Multi-Party ComputationBaum, Carsten / Damgård, Ivan / Orlandi, Claudio et al. | 2014
- 197
-
Reducing the Overhead of MPC over a Large PopulationChoudhury, Ashish / Patra, Arpita / Smart, Nigel P. et al. | 2014
- 218
-
Statistics on Password Re-use and Adaptive Strength for Financial AccountsBailey, Daniel V. / Dürmuth, Markus / Paar, Christof et al. | 2014
- 236
-
Efficient Network-Based Enforcement of Data Access RightsGiura, Paul / Kolesnikov, Vladimir / Tentes, Aris / Vahlis, Yevgeniy et al. | 2014
- 255
-
EyeDecrypt — Private Interactions in Plain SightForte, Andrea G. / Garay, Juan A. / Jim, Trevor / Vahlis, Yevgeniy et al. | 2014
- 277
-
Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean FormulaChen, Jie / Wee, Hoeteck et al. | 2014
- 298
-
Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear AssumptionTakashima, Katsuyuki et al. | 2014
- 318
-
Functional Encryption and Its Impact on CryptographyWee, Hoeteck et al. | 2014
- 324
-
Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All BlocksSasaki, Yu / Wang, Lei et al. | 2014
- 340
-
Improved Indifferentiable Security Analysis of PHOTONNaito, Yusuke / Ohta, Kazuo et al. | 2014
- 358
-
Faster Maliciously Secure Two-Party Computation Using the GPUFrederiksen, Tore Kasper / Jakobsen, Thomas P. / Nielsen, Jesper Buus et al. | 2014
- 380
-
Systematizing Secure Computation for Research and Decision SupportPerry, Jason / Gupta, Debayan / Feigenbaum, Joan / Wright, Rebecca N. et al. | 2014
- 398
-
An Empirical Study and Some Improvements of the MiniMac Protocol for Secure ComputationDamgård, Ivan / Lauritsen, Rasmus / Toft, Tomas et al. | 2014
- 416
-
Efficient NIZK Arguments via Parallel Verification of Benes NetworksLipmaa, Helger et al. | 2014
- 435
-
Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional RelationshipsJain, Abhishek / Pandey, Omkant et al. | 2014
- 455
-
On Adaptively Secure ProtocolsVenkitasubramaniam, Muthuramakrishnan et al. | 2014
- 476
-
Key-Indistinguishable Message Authentication CodesAlwen, Joël / Hirt, Martin / Maurer, Ueli / Patra, Arpita / Raykov, Pavel et al. | 2014
- 494
-
Interactive Encryption and Message AuthenticationDodis, Yevgeniy / Fiore, Dario et al. | 2014
- 514
-
Homomorphic Signatures and Message Authentication CodesCatalano, Dario et al. | 2014
- 520
-
Efficient Proofs of Secure ErasureKarvelas, Nikolaos P. / Kiayias, Aggelos et al. | 2014
- 538
-
Proofs of Space: When Space Is of the EssenceAteniese, Giuseppe / Bonacina, Ilario / Faonio, Antonio / Galesi, Nicola et al. | 2014
- 558
-
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic ResiduesYamakawa, Takashi / Yamada, Shota / Nuida, Koji / Hanaoka, Goichiro / Kunihiro, Noboru et al. | 2014
- 578
-
On Selective-Opening Attacks against Encryption SchemesOstrovsky, Rafail / Rao, Vanishree / Visconti, Ivan et al. | 2014
- 598
-
Narrow Bandwidth Is Not Inherent in Reverse Public-Key EncryptionNaccache, David / Steinwandt, Rainer / Suárez Corona, Adriana / Yung, Moti et al. | 2014