Key-Private Proxy Re-encryption under LWE (English)
- New search for: Aono, Yoshinori
- New search for: Boyen, Xavier
- New search for: Phong, Le Trieu
- New search for: Wang, Lihua
- New search for: Aono, Yoshinori
- New search for: Boyen, Xavier
- New search for: Phong, Le Trieu
- New search for: Wang, Lihua
In:
Progress in Cryptology – INDOCRYPT 2013
1
;
1-18
;
2013
- Article/Chapter (Book) / Electronic Resource
-
Title:Key-Private Proxy Re-encryption under LWE
-
Contributors:Aono, Yoshinori ( author ) / Boyen, Xavier ( author ) / Phong, Le Trieu ( author ) / Wang, Lihua ( author )
-
Published in:Progress in Cryptology – INDOCRYPT 2013 , 1 ; 1-18Lecture Notes in Computer Science ; 8250, 1 ; 1-18
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2013-01-01
-
Size:18 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Key-Private Proxy Re-encryption under LWEAono, Yoshinori / Boyen, Xavier / Phong, Le Trieu / Wang, Lihua et al. | 2013
- 19
-
Breaking the ${\mathcal{O}}(n|C|)$ Barrier for Unconditionally Secure Asynchronous Multiparty ComputationChoudhury, Ashish et al. | 2013
- 38
-
Alternating Product Ciphers: A Case for Provable Security ComparisonsPliam, John O. et al. | 2013
- 50
-
An Integral Distinguisher on Grøstl-512 v3Minier, Marine / Thomas, Gaël et al. | 2013
- 60
-
Warrant-Hiding Delegation-by-Certificate Proxy Signature SchemesHanser, Christian / Slamanig, Daniel et al. | 2013
- 78
-
Improved Scan-Chain Based Attacks and Related CountermeasuresBanik, Subhadeep / Chowdhury, Anusha et al. | 2013
- 98
-
Correlation Analysis against Protected SFM Implementations of RSABauer, Aurélie / Jaulmes, Éliane et al. | 2013
- 116
-
Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power AnalysisClavier, Christophe / Isorez, Quentin / Wurcker, Antoine et al. | 2013
- 136
-
Security Analysis of GFN: 8-Round Distinguisher for 4-Branch Type-2 GFNChang, Donghoon / Kumar, Abhishek / Sanadhya, Somitra et al. | 2013
- 149
-
Improbable Differential from Impossible Differential: On the Validity of the ModelBlondeau, Céline et al. | 2013
- 161
-
Compact Authenticated Key Exchange from Bounded CCA-Secure KEMYoneyama, Kazuki et al. | 2013
- 179
-
On the Share Efficiency of Robust Secret Sharing and Secret Sharing with Cheating DetectionJhanwar, Mahabir Prasad / Safavi-Naini, Reihaneh et al. | 2013
- 197
-
There’s Something about m-aryFeix, Benoit / Verneuil, Vincent et al. | 2013
- 215
-
On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer PerspectiveSantis, Fabrizio / Kasper, Michael / Mangard, Stefan / Sigl, Georg / Stein, Oliver / Stöttinger, Marc et al. | 2013
- 227
-
Multi-precision Squaring for Public-Key Cryptography on Embedded MicroprocessorsSeo, Hwajeong / Liu, Zhe / Choi, Jongseok / Kim, Howon et al. | 2013
- 244
-
8/16/32 Shades of Elliptic Curve Cryptography on Embedded ProcessorsWenger, Erich / Unterluggauer, Thomas / Werner, Mario et al. | 2013
- 262
-
Accelerating Sorting of Fully Homomorphic Encrypted DataChatterjee, Ayantika / Kaushal, Manish / Sengupta, Indranil et al. | 2013
- 274
-
Construction of Recursive MDS Diffusion Layers from Gabidulin CodesBerger, Thierry P. et al. | 2013
- 286
-
Polynomial Structures in Code-Based CryptographyDragoi, Vlad / Cayrel, Pierre-Louis / Colombier, Brice / Richmond, Tania et al. | 2013
- 297
-
Security Analysis of the RC4+ Stream CipherBanik, Subhadeep / Sarkar, Santanu / Kacker, Raghu et al. | 2013
- 308
-
On the Security of Piccolo Lightweight Block Cipher against Related-Key Impossible DifferentialsMinier, Marine et al. | 2013