A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument (English)
- New search for: Lipmaa, Helger
- New search for: Zhang, Bingsheng
- New search for: Lipmaa, Helger
- New search for: Zhang, Bingsheng
In:
Security and Cryptography for Networks
8
;
477-502
;
2012
- Article/Chapter (Book) / Electronic Resource
-
Title:A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument
-
Contributors:Lipmaa, Helger ( author ) / Zhang, Bingsheng ( author )
-
Published in:Security and Cryptography for Networks , 8 ; 477-502Lecture Notes in Computer Science ; 7485, 8 ; 477-502
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2012-01-01
-
Size:26 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input SettingXie, Xiang / Xue, Rui / Zhang, Rui et al. | 2012
- 19
-
Ring Switching in BGV-Style Homomorphic EncryptionGentry, Craig / Halevi, Shai / Peikert, Chris / Smart, Nigel P. et al. | 2012
- 38
-
Zero-Knowledge Proofs with Low Amortized Communication from Lattice AssumptionsDamgård, Ivan / López-Alt, Adriana et al. | 2012
- 57
-
Fully Anonymous Attribute Tokens from LatticesCamenisch, Jan / Neven, Gregory / Rückert, Markus et al. | 2012
- 76
-
Efficient Structure-Preserving Signature Scheme from Standard AssumptionsCamenisch, Jan / Dubovitskaya, Maria / Haralambiev, Kristiyan et al. | 2012
- 95
-
Compact Round-Optimal Partially-Blind SignaturesBlazy, Olivier / Pointcheval, David / Vergnaud, Damien et al. | 2012
- 113
-
History-Free Sequential Aggregate SignaturesFischlin, Marc / Lehmann, Anja / Schröder, Dominique et al. | 2012
- 131
-
A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLINChase, Melissa / Kohlweiss, Markulf et al. | 2012
- 149
-
Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext AwarenessMyers, Steven / Sergi, Mona / shelat, abhi et al. | 2012
- 166
-
Decentralized Dynamic Broadcast EncryptionPhan, Duong Hieu / Pointcheval, David / Strefler, Mario et al. | 2012
- 184
-
Time-Specific Encryption from Forward-Secure EncryptionKasamatsu, Kohei / Matsuda, Takahiro / Emura, Keita / Attrapadung, Nuttapong / Hanaoka, Goichiro / Imai, Hideki et al. | 2012
- 205
-
Improved Secure Two-Party Computation via Information-Theoretic Garbled CircuitsKolesnikov, Vladimir / Kumaresan, Ranjit et al. | 2012
- 222
-
5PM: Secure Pattern MatchingBaron, Joshua / Defrawy, Karim / Minkovich, Kirill / Ostrovsky, Rafail / Tressler, Eric et al. | 2012
- 241
-
Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC ProtocolDamgård, Ivan / Keller, Marcel / Larraia, Enrique / Miles, Christian / Smart, Nigel P. et al. | 2012
- 264
-
On the Centrality of Off-Line E-Cash to Concrete Partial Information GamesChoi, Seung Geol / Dachman-Soled, Dana / Yung, Moti et al. | 2012
- 281
-
Universally Composable Security with Local AdversariesCanetti, Ran / Vald, Margarita et al. | 2012
- 17
-
On the Strength Comparison of the ECDLP and the IFPYasuda, Masaya / Shimoyama, Takeshi / Kogure, Jun / Izu, Tetsuya et al. | 2012
- 326
-
New Attacks for Knapsack Based CryptosystemsHerold, Gottfried / Meurer, Alexander et al. | 2012
- 343
-
Multiple Differential Cryptanalysis Using LLR and χ 2 StatisticsBlondeau, Céline / Gérard, Benoît / Nyberg, Kaisa et al. | 2012
- 361
-
Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative RingsThomae, Enrico et al. | 2012
- 374
-
Homomorphic Encryption for Multiplications and Pairing EvaluationCastagnos, Guilhem / Laguillaumie, Fabien et al. | 2012
- 393
-
Publicly Verifiable CiphertextsGonzález Nieto, Juan Manuel / Manulis, Mark / Poettering, Bertram / Rangasamy, Jothi / Stebila, Douglas et al. | 2012
- 411
-
Public-Key Encryption with Lazy PartiesYasunaga, Kenji et al. | 2012
- 426
-
Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and ExponentiationYu, Ching-Hua / Yang, Bo-Yin et al. | 2012
- 445
-
MAC Aggregation with Message MultiplicityKolesnikov, Vladimir et al. | 2012
- 461
-
Efficiency Limitations of Σ-Protocols for Group Homomorphisms RevisitedTerelius, Björn / Wikström, Douglas et al. | 2012
- 477
-
A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle ArgumentLipmaa, Helger / Zhang, Bingsheng et al. | 2012
- 503
-
Active Security in Multiparty Computation over Black-Box GroupsDesmedt, Yvo / Pieprzyk, Josef / Steinfeld, Ron et al. | 2012
- 522
-
Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long OutputMittelbach, Arno et al. | 2012
- 540
-
Human Perfectly Secure Message Transmission Protocols and Their ApplicationsErotokritou, Stelios / Desmedt, Yvo et al. | 2012
- 559
-
Oblivious Transfer with Hidden Access Control from Attribute-Based EncryptionCamenisch, Jan / Dubovitskaya, Maria / Enderlein, Robert R. / Neven, Gregory et al. | 2012