×

Found 34 Documents (Results 1–34)

On private information retrieval supporting range queries. (English) Zbl 1511.68044

Chen, Liqun (ed.) et al., Computer security – ESORICS 2020. 25th European symposium on research in computer security, ESORICS 2020, Guildford, UK, September 14–18, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12309, 674-694 (2020).
PDFBibTeX XMLCite
Full Text: DOI

Semantic definition of anonymity in identity-based encryption and its relation to indistinguishability-based definition. (English) Zbl 1511.68043

Chen, Liqun (ed.) et al., Computer security – ESORICS 2020. 25th European symposium on research in computer security, ESORICS 2020, Guildford, UK, September 14–18, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12309, 65-85 (2020).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Constant-round client-aided secure comparison protocol. (English) Zbl 1522.68228

Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11099, 395-415 (2018).
MSC:  68Q10 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Formal treatment of verifiable privacy-preserving data-aggregation protocols. (English) Zbl 1443.94085

Baek, Joonsang (ed.) et al., Provable security. 12th international conference, ProvSec 2018, Jeju, South Korea, October 25–28, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11192, 415-422 (2018).
MSC:  94A60 94A62 68P27
PDFBibTeX XMLCite
Full Text: DOI

Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions. (English) Zbl 1448.94204

Catalano, Dario (ed.) et al., Security and cryptography for networks. 11th international conference, SCN 2018, Amalfi, Italy, September 5–7, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11035, 140-159 (2018).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Generic constructions for fully secure revocable attribute-based encryption. (English) Zbl 1522.68092

Foley, Simon N. (ed.) et al., Computer security – ESORICS 2017. 22nd European symposium on research in computer security, Oslo, Norway, September 11–15, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10493, 532-551 (2017).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure grouping protocol using a deck of cards. (English) Zbl 1417.94062

Shikata, Junji (ed.), Information theoretic security. 10th international conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10681, 135-152 (2017).
MSC:  94A60 68P25 68M12
PDFBibTeX XMLCite
Full Text: DOI arXiv

Signatures resilient to uninvertible leakage. (English) Zbl 1482.94073

Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9841, 372-390 (2016).
MSC:  94A62 68M25
PDFBibTeX XMLCite
Full Text: DOI

Attribute-based encryption for range attributes. (English) Zbl 1400.94114

Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-44617-2/pbk; 978-3-319-44618-9/ebook). Lecture Notes in Computer Science 9841, 42-61 (2016).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Secure multi-party computation using polarizing cards. (English) Zbl 1398.68145

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 281-297 (2015).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data. (English) Zbl 1398.68148

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 242-261 (2015).
MSC:  68P25 92D10 94A60
PDFBibTeX XMLCite
Full Text: DOI

A signature scheme with a fuzzy private key. (English) Zbl 1348.94073

Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-28165-0/pbk; 978-3-319-28166-7/ebook). Lecture Notes in Computer Science 9092, 105-126 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Black-box separations of hash-and-sign signatures in the non-programmable random oracle model. (English) Zbl 1338.94096

Au, Man-Ho (ed.) et al., Provable security. 9th international conference, ProvSec 2015, Kanazawa, Japan, November 24–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26058-7/pbk; 978-3-319-26059-4/ebook). Lecture Notes in Computer Science 9451, 435-454 (2015).
MSC:  94A62 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

All-but-one dual projective hashing and its applications. (English) Zbl 1353.94079

Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 181-198 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Ciphertext policy multi-dimensional range encryption. (English) Zbl 1342.94073

Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 247-261 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Advances in information and computer security. 7th international workshop on security, IWSEC 2012, Fukuoka, Japan, November 7–9, 2012. Proceedings. (English) Zbl 1259.68006

Lecture Notes in Computer Science 7631. Berlin: Springer (ISBN 978-3-642-34116-8/pbk). xii, 261 p. (2012).
PDFBibTeX XMLCite
Full Text: DOI

Time-specific encryption from forward-secure encryption. (English) Zbl 1310.94154

Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 184-204 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

On the security of pseudorandomized information-theoretically secure schemes. (English) Zbl 1282.94061

Kurosawa, Kaoru (ed.), Information theoretic security. 4th international conference, ICITS 2009, Shizuoka, Japan, December 3–6, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14495-0/pbk). Lecture Notes in Computer Science 5973, 56-73 (2010).
PDFBibTeX XMLCite
Full Text: DOI

Generic constructions of parallel key-insulated encryption. (English) Zbl 1286.68112

Garay, Juan A. (ed.) et al., Security and cryptography for networks. 7th international conference, SCN 2010, Amalfi, Italy, September 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15316-7/pbk). Lecture Notes in Computer Science 6280, 36-53 (2010).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Adaptively secure traitor tracing against key exposure and its application to anywhere tv service. (English) Zbl 1176.94053

Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 123-135 (2006).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Generic transforms to acquire cca-security for identity based encryption: the cases of FO\(_{\text{pkc}}\) and react. (English) Zbl 1176.94047

Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 348-359 (2006).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

On the security of cryptosystems with all-or-nothing transform. (English) Zbl 1103.68548

Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 76-90 (2004).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Unconditionally non-interactive verifiable secret sharing secure against faulty majorities in the commodity based model. (English) Zbl 1103.68532

Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 355-368 (2004).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Unconditionally secure homomorphic pre-distributed bit commitment and secure two-party computations. (English) Zbl 1255.94063

Boyd, Colin (ed.) et al., Information security. 6th international conference, ISC 2003, Bristol, UK, October 1–3, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20176-9/pbk). Lect. Notes Comput. Sci. 2851, 151-164 (2003).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI

Separating encryption and key issuance in digital rights management systems. (English) Zbl 1042.68570

Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9–11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 365-376 (2003).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: Link

Efficient and unconditionally secure digital signatures and a security analysis of a multireceiver authentication code. (English) Zbl 1055.94535

Naccache, David (ed.) et al., Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12–14, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43168-3). Lect. Notes Comput. Sci. 2274, 64-79 (2002).
MSC:  94A62 68Q25
PDFBibTeX XMLCite
Full Text: Link

Unconditionally secure key insulated cryptosystems: Models, bounds and constructions. (English) Zbl 1023.68553

Deng, Robert (ed.) et al., Information and communications security. 4th international conference, ICICS 2002, Singapore, December 9-12, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2513, 85-96 (2002).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: Link

Unconditionally secure anonymous encryption and group authentication. (English) Zbl 1065.94550

Zheng, Yuliang (ed.), Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1–5, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00171-9). Lect. Notes Comput. Sci. 2501, 81-99 (2002).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

A practical implementation of hierarchically structured key predistribution system and its evaluation. (English) Zbl 1044.68609

Pieprzyk, Josef (ed.) et al., Information security. 3rd international workshop, ISW 2000, Wollongong, Australia, December 20–21, 2000. Proceedings. Berlin: Springer (ISBN 3-540-41416-9). Lect. Notes Comput. Sci. 1975, 224-236 (2000).
MSC:  68P25
PDFBibTeX XMLCite
Full Text: Link

An efficient hierarchical identity-based key-sharing method resistant against collusion-attacks. (English) Zbl 0977.94032

Lam, Kwok Yan (ed.) et al., Advances in cryptology - ASIACRYPT ’99. International conference on the theory and application of cryptology and information security, Singapore, November 14-18, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1716, 348-362 (1999).
MSC:  94A60 68P25
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

Software