Efficient Non-interactive Proof Systems for Bilinear Groups (English)
Free access
- New search for: Groth, Jens
- New search for: Sahai, Amit
- New search for: Groth, Jens
- New search for: Sahai, Amit
In:
Advances in Cryptology – EUROCRYPT 2008
;
415-432
;
2008
- Article/Chapter (Book) / Electronic Resource
-
Title:Efficient Non-interactive Proof Systems for Bilinear Groups
-
Contributors:Groth, Jens ( author ) / Sahai, Amit ( author )
-
Published in:Advances in Cryptology – EUROCRYPT 2008 ; 415-432Lecture Notes in Computer Science ; 4965 ; 415-432
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2008-01-01
-
Size:18 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
A Practical Attack on KeeLoqIndesteege, Sebastiaan / Keller, Nathan / Dunkelman, Orr / Biham, Eli / Preneel, Bart et al. | 2008
- 2
-
Key Recovery on Hidden Monomial Multivariate SchemesFouque, Pierre-Alain / Macario-Rat, Gilles / Stern, Jacques et al. | 2008
- 3
-
Predicting Lattice ReductionGama, Nicolas / Nguyen, Phong Q. et al. | 2008
- 4
-
Efficient Sequential Aggregate Signed DataNeven, Gregory et al. | 2008
- 70
-
Proving Tight Security for Rabin-Williams SignaturesBernstein, Daniel J. et al. | 2008
- 6
-
Threshold RSA for Dynamic and Ad-Hoc GroupsGennaro, Rosario / Halevi, Shai / Krawczyk, Hugo / Rabin, Tal et al. | 2008
- 7
-
Towards Key-Dependent Message Security in the Standard ModelHofheinz, Dennis / Unruh, Dominique et al. | 2008
- 8
-
The Twin Diffie-Hellman Problem and ApplicationsCash, David / Kiltz, Eike / Shoup, Victor et al. | 2008
- 146
-
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner ProductsKatz, Jonathan / Sahai, Amit / Waters, Brent et al. | 2008
- 10
-
Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic CurvesSmith, Benjamin et al. | 2008
- 181
-
On the Indifferentiability of the Sponge ConstructionBertoni, Guido / Daemen, Joan / Peeters, Michaël / Assche, Gilles et al. | 2008
- 12
-
A New Mode of Operation for Block Ciphers and Length-Preserving MACsDodis, Yevgeniy / Pietrzak, Krzysztof / Puniya, Prashant et al. | 2008
- 13
-
Security/Efficiency Tradeoffs for Permutation-Based HashingRogaway, Phillip / Steinberger, John et al. | 2008
- 14
-
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5Wang, Lei / Ohta, Kazuo / Kunihiro, Noboru et al. | 2008
- 15
-
Collisions for the LPS Expander Graph Hash FunctionTillich, Jean-Pierre / Zémor, Gilles et al. | 2008
- 270
-
Second Preimage Attacks on Dithered Hash FunctionsAndreeva, Elena / Bouillaguet, Charles / Fouque, Pierre-Alain / Hoch, Jonathan J. / Kelsey, John / Shamir, Adi / Zimmer, Sebastien et al. | 2008
- 289
-
Efficient Two Party and Multi Party Computation Against Covert AdversariesGoyal, Vipul / Mohassel, Payman / Smith, Adam et al. | 2008
- 307
-
Almost-Everywhere Secure ComputationGaray, Juan A. / Ostrovsky, Rafail et al. | 2008
- 324
-
Truly Efficient 2-Round Perfectly Secure Message Transmission SchemeKurosawa, Kaoru / Suzuki, Kazuhiro et al. | 2008
- 341
-
Protocols and Lower Bounds for Failure Localization in the InternetBarak, Boaz / Goldberg, Sharon / Xiao, David et al. | 2008
- 21
-
: Increasing the Security and Efficiency ofGilbert, Henri / Robshaw, Matthew J. B. / Seurin, Yannick et al. | 2008
- 379
-
Sub-linear Zero-Knowledge Argument for Correctness of a ShuffleGroth, Jens / Ishai, Yuval et al. | 2008
- 397
-
Precise Concurrent Zero KnowledgePandey, Omkant / Pass, Rafael / Sahai, Amit / Tseng, Wei-Lung Dustin / Venkitasubramaniam, Muthuramakrishnan et al. | 2008
- 415
-
Efficient Non-interactive Proof Systems for Bilinear GroupsGroth, Jens / Sahai, Amit et al. | 2008
- 25
-
Zero-Knowledge Sets with Short ProofsCatalano, Dario / Fiore, Dario / Messina, Mariagrazia et al. | 2008
- 26
-
Strongly Multiplicative Ramp Schemes from High Degree Rational Points on CurvesChen, Hao / Cramer, Ronald / de Haan, Robbert / Pueyo, Ignacio Cascudo et al. | 2008
- 471
-
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy ExtractorsCramer, Ronald / Dodis, Yevgeniy / Fehr, Serge / Padró, Carles / Wichs, Daniel et al. | 2008
- 489
-
Obfuscating Point Functions with Multibit OutputCanetti, Ran / Dakdouk, Ronny Ramzi et al. | 2008
- 29
-
Isolated Proofs of Knowledge and Isolated Zero KnowledgeDamgård, Ivan / Nielsen, Jesper Buus / Wichs, Daniel et al. | 2008
- 30
-
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof HardwareMoran, Tal / Segev, Gil et al. | 2008
- 545
-
New Constructions for UC Secure Computation Using Tamper-Proof HardwareChandran, Nishanth / Goyal, Vipul / Sahai, Amit et al. | 2008