De Cristofaro, Emiliano; Kim, Jihye; Tsudik, Gene Linear-complexity private set intersection protocols secure in malicious model. (English) Zbl 1253.94044 Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 213-231 (2010). MSC: 94A60 PDF BibTeX XML Cite \textit{E. De Cristofaro} et al., Lect. Notes Comput. Sci. 6477, 213--231 (2010; Zbl 1253.94044) Full Text: DOI
Jarecki, Stanisław; Kim, Jihye; Tsudik, Gene Beyond secret handshakes: Affiliation-hiding authenticated key exchange. (English) Zbl 1153.94396 Malkin, Tal (ed.), Topics in cryptology – CT-RSA 2008. The cryptographers’ track at the RSA conference 2008, San Francisco, CA, USA, April 8–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-79262-8/pbk). Lecture Notes in Computer Science 4964, 352-369 (2008). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{S. Jarecki} et al., Lect. Notes Comput. Sci. 4964, 352--369 (2008; Zbl 1153.94396) Full Text: DOI
Jarecki, Stanisław; Kim, Jihye; Tsudik, Gene Group secret handshakes or affiliation-hiding authenticated group key agreement. (English) Zbl 1177.94188 Abe, Masayuki (ed.), Topics in cryptology – CT-RSA 2007. The cryptographers’ track at the RSA conference 2007, San Francisco, CA, USA, February 5-9, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-69327-7/pbk). Lecture Notes in Computer Science 4377, 287-308 (2006). MSC: 94A62 PDF BibTeX XML Cite \textit{S. Jarecki} et al., Lect. Notes Comput. Sci. 4377, 287--308 (2006; Zbl 1177.94188) Full Text: DOI
Jarecki, Stanisław; Kim, Jihye; Tsudik, Gene Authentication for paranoids: Multi-party secret handshakes. (English) Zbl 1151.94612 Zhou, Jianying (ed.) et al., Applied cryptography and network security. 4th international conference, ACNS 2006, Singapore, June 6–9, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34703-8/pbk). Lecture Notes in Computer Science 3989, 325-339 (2006). MSC: 94A62 PDF BibTeX XML Cite \textit{S. Jarecki} et al., Lect. Notes Comput. Sci. 3989, 325--339 (2006; Zbl 1151.94612) Full Text: DOI
Castelluccia, Claude; Jarecki, Stanisław; Kim, Jihye; Tsudik, Gene Secure acknowledgment aggregation and multisignatures with limited robustness. (English) Zbl 1105.68032 Comput. Netw. 50, No. 10, 1639-1652 (2006). MSC: 68P25 68M12 68M10 PDF BibTeX XML Cite \textit{C. Castelluccia} et al., Comput. Netw. 50, No. 10, 1639--1652 (2006; Zbl 1105.68032) Full Text: DOI
Castelluccia, Claude; Jarecki, Stanisław; Kim, Jihye; Tsudik, Gene A robust multisignature scheme with applications to acknowledgement aggregation. (English) Zbl 1116.94312 Blundo, Carlo (ed.) et al., Security in communication networks. 4th international conference, SCN 2004, Amalfi, Italy, September 8–10, 2004. Revised selected papers. Berlin: Springer (ISBN 3-540-24301-1/pbk). Lecture Notes in Computer Science 3352, 193-207 (2005). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{C. Castelluccia} et al., Lect. Notes Comput. Sci. 3352, 193--207 (2005; Zbl 1116.94312) Full Text: DOI