Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption (English)
- New search for: Naccache, David
- New search for: Steinwandt, Rainer
- New search for: Suárez Corona, Adriana
- New search for: Yung, Moti
- New search for: Naccache, David
- New search for: Steinwandt, Rainer
- New search for: Suárez Corona, Adriana
- New search for: Yung, Moti
In:
Security and Cryptography for Networks
15
;
598-607
;
2014
- Article/Chapter (Book) / Electronic Resource
-
Title:Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption
-
Contributors:Naccache, David ( author ) / Steinwandt, Rainer ( author ) / Suárez Corona, Adriana ( author ) / Yung, Moti ( author )
-
Published in:Security and Cryptography for Networks , 15 ; 598-607Lecture Notes in Computer Science ; 8642, 15 ; 598-607
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2014-01-01
-
Size:10 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Universally Composable Non-Interactive Key ExchangeFreire, Eduarda S. V. / Hesse, Julia / Hofheinz, Dennis et al. | 2014
- 21
-
Forward Secure Non-Interactive Key ExchangePointcheval, David / Sanders, Olivier et al. | 2014
- 40
-
Secure Key Exchange and Sessions without CredentialsCanetti, Ran / Kolesnikov, Vladimir / Rackoff, Charles / Vahlis, Yevgeniy et al. | 2014
- 57
-
Relaxed Two-to-One Recoding SchemesPandey, Omkant / Ramchen, Kim / Waters, Brent et al. | 2014
- 77
-
Obfuscation ⇒ (IND-CPA Security $\not\Rightarrow$ Circular Security)Marcedone, Antonio / Orlandi, Claudio et al. | 2014
- 91
-
Program Obfuscation via Multilinear MapsGarg, Sanjam et al. | 2014
- 95
-
Constrained Verifiable Random FunctionsFuchsbauer, Georg et al. | 2014
- 115
-
Publicly Evaluable Pseudorandom Functions and Their ApplicationsChen, Yu / Zhang, Zongyang et al. | 2014
- 135
-
On the Classification of Finite Boolean Functions up to FairnessMakriyannis, Nikolaos et al. | 2014
- 155
-
Communication-Efficient MPC for General Adversary StructuresLampkins, Joshua / Ostrovsky, Rafail et al. | 2014
- 175
-
Publicly Auditable Secure Multi-Party ComputationBaum, Carsten / Damgård, Ivan / Orlandi, Claudio et al. | 2014
- 197
-
Reducing the Overhead of MPC over a Large PopulationChoudhury, Ashish / Patra, Arpita / Smart, Nigel P. et al. | 2014
- 218
-
Statistics on Password Re-use and Adaptive Strength for Financial AccountsBailey, Daniel V. / Dürmuth, Markus / Paar, Christof et al. | 2014
- 236
-
Efficient Network-Based Enforcement of Data Access RightsGiura, Paul / Kolesnikov, Vladimir / Tentes, Aris / Vahlis, Yevgeniy et al. | 2014
- 255
-
EyeDecrypt — Private Interactions in Plain SightForte, Andrea G. / Garay, Juan A. / Jim, Trevor / Vahlis, Yevgeniy et al. | 2014
- 277
-
Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean FormulaChen, Jie / Wee, Hoeteck et al. | 2014
- 298
-
Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear AssumptionTakashima, Katsuyuki et al. | 2014
- 318
-
Functional Encryption and Its Impact on CryptographyWee, Hoeteck et al. | 2014
- 324
-
Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All BlocksSasaki, Yu / Wang, Lei et al. | 2014
- 340
-
Improved Indifferentiable Security Analysis of PHOTONNaito, Yusuke / Ohta, Kazuo et al. | 2014
- 358
-
Faster Maliciously Secure Two-Party Computation Using the GPUFrederiksen, Tore Kasper / Jakobsen, Thomas P. / Nielsen, Jesper Buus et al. | 2014
- 380
-
Systematizing Secure Computation for Research and Decision SupportPerry, Jason / Gupta, Debayan / Feigenbaum, Joan / Wright, Rebecca N. et al. | 2014
- 398
-
An Empirical Study and Some Improvements of the MiniMac Protocol for Secure ComputationDamgård, Ivan / Lauritsen, Rasmus / Toft, Tomas et al. | 2014
- 416
-
Efficient NIZK Arguments via Parallel Verification of Benes NetworksLipmaa, Helger et al. | 2014
- 435
-
Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional RelationshipsJain, Abhishek / Pandey, Omkant et al. | 2014
- 455
-
On Adaptively Secure ProtocolsVenkitasubramaniam, Muthuramakrishnan et al. | 2014
- 476
-
Key-Indistinguishable Message Authentication CodesAlwen, Joël / Hirt, Martin / Maurer, Ueli / Patra, Arpita / Raykov, Pavel et al. | 2014
- 494
-
Interactive Encryption and Message AuthenticationDodis, Yevgeniy / Fiore, Dario et al. | 2014
- 514
-
Homomorphic Signatures and Message Authentication CodesCatalano, Dario et al. | 2014
- 520
-
Efficient Proofs of Secure ErasureKarvelas, Nikolaos P. / Kiayias, Aggelos et al. | 2014
- 538
-
Proofs of Space: When Space Is of the EssenceAteniese, Giuseppe / Bonacina, Ilario / Faonio, Antonio / Galesi, Nicola et al. | 2014
- 558
-
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic ResiduesYamakawa, Takashi / Yamada, Shota / Nuida, Koji / Hanaoka, Goichiro / Kunihiro, Noboru et al. | 2014
- 578
-
On Selective-Opening Attacks against Encryption SchemesOstrovsky, Rafail / Rao, Vanishree / Visconti, Ivan et al. | 2014
- 598
-
Narrow Bandwidth Is Not Inherent in Reverse Public-Key EncryptionNaccache, David / Steinwandt, Rainer / Suárez Corona, Adriana / Yung, Moti et al. | 2014