On Tightly Secure Primitives in the Multi-instance Setting (English)
- New search for: Hofheinz, Dennis
- New search for: Nguyen, Ngoc Khanh
- New search for: Lin, Dongdai
- New search for: Sako, Kazue
- New search for: Hofheinz, Dennis
- New search for: Nguyen, Ngoc Khanh
In:
Public-Key Cryptography – PKC 2019
: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I
;
Chapter: 20
;
581-611
;
2019
- Article/Chapter (Book) / Electronic Resource
-
Title:On Tightly Secure Primitives in the Multi-instance Setting
-
Additional title:Lect.Notes Computer
-
Contributors:Lin, Dongdai ( editor ) / Sako, Kazue ( editor ) / Hofheinz, Dennis ( author ) / Nguyen, Ngoc Khanh ( author )
-
Conference:IACR International Workshop on Public Key Cryptography ; 2019 ; Beijing, China
-
Published in:Public-Key Cryptography – PKC 2019 : 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I ; Chapter: 20 ; 581-611Lecture Notes in Computer Science ; 11442 ; 581-611Security and Cryptology ; 581-611
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2019-04-06
-
Size:31 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Sub-logarithmic Distributed Oblivious RAM with Small Block SizeKushilevitz, Eyal / Mour, Tamer et al. | 2019
- 2
-
Lossy Algebraic Filters with Short TagsLibert, Benoît / Qian, Chen et al. | 2019
- 3
-
Non-interactive Keyed-Verification Anonymous CredentialsCouteau, Geoffroy / Reichle, Michael et al. | 2019
- 4
-
Shorter Ring Signatures from Standard AssumptionsGonzález, Alonso et al. | 2019
- 5
-
Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching ProgramsDatta, Pratish / Okamoto, Tatsuaki / Takashima, Katsuyuki et al. | 2019
- 6
-
Efficient Invisible and Unlinkable Sanitizable SignaturesBultel, Xavier / Lafourcade, Pascal / Lai, Russell W. F. / Malavolta, Giulio / Schröder, Dominique / Thyagarajan, Sri Aravinda Krishnan et al. | 2019
- 7
-
Group Signatures with Selective LinkabilityGarms, Lydia / Lehmann, Anja et al. | 2019
- 8
-
Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline WatchdogChow, Sherman S. M. / Russell, Alexander / Tang, Qiang / Yung, Moti / Zhao, Yongjun / Zhou, Hong-Sheng et al. | 2019
- 9
-
Zero-Knowledge Elementary Databases with More Expressive QueriesLibert, Benoît / Nguyen, Khoa / Tan, Benjamin Hong Meng / Wang, Huaxiong et al. | 2019
- 10
-
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted SetupBackes, Michael / Hanzlik, Lucjan / Herzberg, Amir / Kate, Aniket / Pryvalov, Ivan et al. | 2019
- 11
-
Shorter Quadratic QA-NIZK ProofsDaza, Vanesa / González, Alonso / Pindado, Zaira / Ràfols, Carla / Silva, Javier et al. | 2019
- 12
-
Short Discrete Log Proofs for FHE and Ring-LWE Ciphertextsdel Pino, Rafael / Lyubashevsky, Vadim / Seiler, Gregor et al. | 2019
- 13
-
Publicly Verifiable Proofs from BlockchainsScafuro, Alessandra / Siniscalchi, Luisa / Visconti, Ivan et al. | 2019
- 14
-
Identity-Based Broadcast Encryption with Efficient RevocationGe, Aijun / Wei, Puwen et al. | 2019
- 15
-
Tightly Secure Hierarchical Identity-Based EncryptionLangrehr, Roman / Pan, Jiaxin et al. | 2019
- 16
-
Leakage-Resilient Identity-Based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-RatioNishimaki, Ryo / Yamakawa, Takashi et al. | 2019
- 17
-
Additively Homomorphic IBE from Higher ResiduosityClear, Michael / McGoldrick, Ciaran et al. | 2019
- 18
-
Upper and Lower Bounds for Continuous Non-Malleable CodesDachman-Soled, Dana / Kulkarni, Mukul et al. | 2019
- 19
-
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary DistributionsMatsuda, Takahiro / Takahashi, Kenta / Murakami, Takao / Hanaoka, Goichiro et al. | 2019
- 20
-
On Tightly Secure Primitives in the Multi-instance SettingHofheinz, Dennis / Nguyen, Ngoc Khanh et al. | 2019