Tagged One-Time Signatures: Tight Security and Optimal Tag Size (Englisch)
- Neue Suche nach: Abe, Masayuki
- Neue Suche nach: David, Bernardo
- Neue Suche nach: Kohlweiss, Markulf
- Neue Suche nach: Nishimaki, Ryo
- Neue Suche nach: Ohkubo, Miyako
- Neue Suche nach: Abe, Masayuki
- Neue Suche nach: David, Bernardo
- Neue Suche nach: Kohlweiss, Markulf
- Neue Suche nach: Nishimaki, Ryo
- Neue Suche nach: Ohkubo, Miyako
In:
PKC, International Conference on Practice and Theory in Public Key Cryptography, 16
;
312-331
;
2013
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Tagged One-Time Signatures: Tight Security and Optimal Tag Size
-
Beteiligte:Abe, Masayuki ( Autor:in ) / David, Bernardo ( Autor:in ) / Kohlweiss, Markulf ( Autor:in ) / Nishimaki, Ryo ( Autor:in ) / Ohkubo, Miyako ( Autor:in )
-
Erschienen in:Lecture Notes in Computer Science ; 7778 ; 312-331
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:2013
-
Format / Umfang:20 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Packed Ciphertexts in LWE-Based Homomorphic EncryptionBrakerski, Z. / Gentry, C. / Halevi, S. / International Association for Cryptologic Research et al. | 2013
- 14
-
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic EncryptionKatz, J. / Thiruvengadam, A. / Zhou, H.-S. / International Association for Cryptologic Research et al. | 2013
- 32
-
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key EncryptionEmura, K. / Hanaoka, G. / Ohtake, G. / Matsuda, T. / Yamada, S. / International Association for Cryptologic Research et al. | 2013
- 51
-
Functional Encryption: Origins and Recent DevelopmentsWaters, B. / International Association for Cryptologic Research et al. | 2013
- 55
-
Vector Commitments and Their ApplicationsCatalano, D. / Fiore, D. / International Association for Cryptologic Research et al. | 2013
- 73
-
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRSChoi, S.G. / Katz, J. / Wee, H. / Zhou, H.-S. / International Association for Cryptologic Research et al. | 2013
- 89
-
Cryptography Using Captcha PuzzlesKumarasubramanian, A. / Ostrovsky, R. / Pandey, O. / Wadia, A. / International Association for Cryptologic Research et al. | 2013
- 107
-
Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and ApplicationsLing, S. / Nguyen, K. / Stehle, D. / Wang, H. / International Association for Cryptologic Research et al. | 2013
- 125
-
Decentralized Attribute-Based SignaturesOkamoto, T. / Takashima, K. / International Association for Cryptologic Research et al. | 2013
- 143
-
On the Semantic Security of Functional Encryption SchemesBarbosa, M. / Farshim, P. / International Association for Cryptologic Research et al. | 2013
- 162
-
Attribute-Based Encryption with Fast DecryptionHohenberger, S. / Waters, B. / International Association for Cryptologic Research et al. | 2013
- 180
-
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and ErrorsKunihiro, N. / Shinohara, N. / Izu, T. / International Association for Cryptologic Research et al. | 2013
- 198
-
Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public?Barbu, G. / Battistello, A. / Dabosville, G. / Giraud, C. / Renault, G. / Renner, S. / Zeitoun, R. / International Association for Cryptologic Research et al. | 2013
- 216
-
Revocable Identity-Based Encryption Revisited: Security Model and ConstructionSeo, J.H. / Emura, K. / International Association for Cryptologic Research et al. | 2013
- 235
-
Improved (Hierarchical) Inner-Product Encryption from LatticesXagawa, K. / International Association for Cryptologic Research et al. | 2013
- 253
-
Techniques for Efficient Secure Computation Based on Yao's ProtocolLindell, Y. / International Association for Cryptologic Research et al. | 2013
- 254
-
Non-Interactive Key ExchangeFreire, E.S.V. / Hofheinz, D. / Kiltz, E. / Paterson, K.G. / International Association for Cryptologic Research et al. | 2013
- 272
-
Efficient UC-Secure Authenticated Key-Exchange for Algebraic LanguagesHamouda, F.B. / Blazy, O. / Chevalier, C. / Pointcheval, D. / Vergnaud, D. / International Association for Cryptologic Research et al. | 2013
- 292
-
Tighter Reductions for Forward-Secure Signature SchemesAbdalla, M. / Hamouda, F.B. / Pointcheval, D. / International Association for Cryptologic Research et al. | 2013
- 312
-
Tagged One-Time Signatures: Tight Security and Optimal Tag SizeAbe, M. / David, B. / Kohlweiss, M. / Nishimaki, R. / Ohkubo, M. / International Association for Cryptologic Research et al. | 2013
- 332
-
Key Encapsulation Mechanisms from Extractable Hash Proof Systems, RevisitedMatsuda, T. / Hanaoka, G. / International Association for Cryptologic Research et al. | 2013
- 352
-
Robust Encryption, RevisitedFarshim, P. / Libert, B. / Paterson, K.G. / Quaglia, E.A. / International Association for Cryptologic Research et al. | 2013
- 369
-
Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks RevisitedHuang, Z. / Liu, S. / Qin, B. / International Association for Cryptologic Research et al. | 2013
- 386
-
Efficient Completely Context-Hiding Quotable and Linearly Homomorphic SignaturesAttrapadung, N. / Libert, B. / Peters, T. / International Association for Cryptologic Research et al. | 2013
- 405
-
Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VESNishimaki, R. / Xagawa, K. / International Association for Cryptologic Research et al. | 2013
- 423
-
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation StudiesLee, K. / Lee, D.H. / Yung, M. / International Association for Cryptologic Research et al. | 2013
- 443
-
New Constructions and Applications of Trapdoor DDH GroupsSeurin, Y. / International Association for Cryptologic Research et al. | 2013
- 461
-
Rate-Limited Secure Function Evaluation: Definitions and ConstructionsDagdelen, O. / Mohassel, P. / Venturi, D. / International Association for Cryptologic Research et al. | 2013
- 479
-
Verifiable Elections That Scale for FreeChase, M. / Kohlweiss, M. / Lysyanskaya, A. / Meiklejohn, S. / International Association for Cryptologic Research et al. | 2013
- 497
-
On the Connection between Leakage Tolerance and Adaptive SecurityNielsen, J.B. / Venturi, D. / Zottarel, A. / International Association for Cryptologic Research et al. | 2013