×

Found 115 Documents (Results 1–100)

A secure cross-shard view-change protocol for sharding blockchains. (English) Zbl 1522.94074

Baek, Joonsang (ed.) et al., Information security and privacy. 26th Australasian conference, ACISP 2021, virtual event, December 1–3, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13083, 372-390 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A paid message forwarding scheme based on social network. (English) Zbl 1479.91279

Wu, Yongdong (ed.) et al., Information security and cryptology. 16th international conference, Inscrypt 2020, Guangzhou, China, December 11–14, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12612, 177-192 (2021).
MSC:  91D30 94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Traceable ring signatures with post-quantum security. (English) Zbl 1457.94206

Jarecki, Stanislaw (ed.), Topics in cryptology – CT-RSA 2020. The cryptographers’ track at the RSA conference 2020, San Francisco, CA, USA, February 24–28, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12006, 442-468 (2020).
MSC:  94A62 94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Auditable hierarchy-private public-key encryption. (English) Zbl 1444.94117

Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10946, 322-340 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Linkable group signature for auditing anonymous communication. (English) Zbl 1444.94116

Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10946, 304-321 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Predicate fully homomorphic encryption: achieving fine-grained access control over manipulable ciphertext. (English) Zbl 1426.94097

Chen, Xiaofeng (ed.) et al., Information security and cryptology. 13th international conference, Inscrypt 2017, Xi’an, China, November 3–5, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10726, 278-298 (2018).
MSC:  94A60 68M11
PDFBibTeX XMLCite
Full Text: DOI

Dynamic searchable symmetric encryption with physical deletion and small leakage. (English) Zbl 1386.94088

Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-60054-3/pbk; 978-3-319-60055-0/ebook). Lecture Notes in Computer Science 10342, 207-226 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Towards certificate-based group encryption. (English) Zbl 1381.94084

Chen, Liqun (ed.) et al., Provable security. 10th international conference, ProvSec 2016, Nanjing, China, November 10–11, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-47421-2/pbk; 978-3-319-47422-9/ebook). Lecture Notes in Computer Science 10005, 296-305 (2016).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Identity-based group encryption. (English) Zbl 1346.94115

Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 87-102 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Towards efficient fully randomized message-locked encryption. (English) Zbl 1403.94064

Liu, Joseph K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-40252-9/pbk; 978-3-319-40253-6/ebook). Lecture Notes in Computer Science 9722, 361-375 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Accelerating oblivious transfer with batch multi-exponentiation. (English) Zbl 1409.94906

Liu, Joseph K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9722, 310-326 (2016).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI

Batch blind signatures on elliptic curves. (English) Zbl 1403.94099

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 192-206 (2015).
MSC:  94A62 14G50
PDFBibTeX XMLCite
Full Text: DOI

Secure one-to-group communications escrow-free ID-based asymmetric group key agreement. (English) Zbl 1347.94065

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 239-254 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical direct chosen ciphertext secure key-policy attribute-based encryption with public ciphertext test. (English) Zbl 1443.94071

Kutyłowski, Mirosław (ed.) et al., Computer security – ESORICS 2014. 19th European symposium on research in computer security, Wrocław, Poland, September 7–11, 2014. Proceedings, Part II. Berlin: Springer. Lect. Notes Comput. Sci. 8713, 91-108 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Hierarchical identity-based broadcast encryption. (English) Zbl 1337.94050

Susilo, Willy (ed.) et al., Information security and privacy. 19th Australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7–9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08343-8/pbk). Lecture Notes in Computer Science 8544, 242-257 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical distributed signatures in the standard model. (English) Zbl 1337.94103

Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 307-326 (2014).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Bridging broadcast encryption and group key agreement. (English) Zbl 1227.94067

Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 143-160 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Fully distributed broadcast encryption. (English) Zbl 1298.94111

Boyen, Xavier (ed.) et al., Provable security. 5th international conference, ProvSec 2011, Xi’an, China, October 16–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-24315-8/pbk). Lecture Notes in Computer Science 6980, 102-119 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Threshold public-key encryption with adaptive security and short ciphertexts. (English) Zbl 1295.94134

Soriano, Miguel (ed.) et al., Information and communications security. 12th international conference, ICICS 2010, Barcelona, Spain, December 15–17, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17649-4/pbk). Lecture Notes in Computer Science 6476, 62-76 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Identity-based authenticated asymmetric group key agreement protocol. (English) Zbl 1282.94074

Thai, My T. (ed.) et al., Computing and combinatorics. 16th annual international conference, COCOON 2010, Nha Trang, Vietnam, July 19–21, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14030-3/pbk). Lecture Notes in Computer Science 6196, 510-519 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Novel efficient certificateless aggregate signatures. (English) Zbl 1273.94370

Bras-Amorós, Maria (ed.) et al., Applied algebra, algebraic algorithms and error-correcting codes. 18th international symposium, AAECC-18, Tarragona, Sapin, June 8–12, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02180-0/pbk). Lecture Notes in Computer Science 5527, 235-238 (2009).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Identity-based verifiably encrypted signatures without random oracles. (English) Zbl 1267.94135

Pieprzyk, Josef (ed.) et al., Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). Lecture Notes in Computer Science 5848, 76-89 (2009).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Asymmetric group key agreement. (English) Zbl 1239.94078

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 153-170 (2009).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Privacy for private key in signatures. (English) Zbl 1237.94099

Yung, Moti (ed.) et al., Information security and cryptology. 4th international conference, Inscrypt 2008, Beijing, China, December 14–17, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-642-01439-0/pbk). Lecture Notes in Computer Science 5487, 84-95 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Publicly verifiable privacy-preserving group decryption. (English) Zbl 1237.94090

Yung, Moti (ed.) et al., Information security and cryptology. 4th international conference, Inscrypt 2008, Beijing, China, December 14–17, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-642-01439-0/pbk). Lecture Notes in Computer Science 5487, 72-83 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Concurrent signatures without a conventional keystone. (English) Zbl 1157.94371

Li, Yongqing (ed.) et al., Coding and cryptology. Proceedings of the first international workshop, Wuyi Mountain, Fujian, China, June 11–15, 2007. Hackensack, NJ: World Scientific (ISBN 978-981-283-223-8/hbk). Series on Coding Theory and Cryptology 4, 196-213 (2008).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient partially blind signatures with provable security. (English) Zbl 1171.94366

Gavrilova, Marina (ed.) et al., Computational science and its applications – ICCSA 2006. International conference, Glasgow, UK, May 8–11, 2006. Proceedings, Part III. Berlin: Springer (ISBN 3-540-34075-0/pbk). Lecture Notes in Computer Science 3982, 345-354 (2006).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Compact e-cash from bounded accumulator. (English) Zbl 1177.94179

Abe, Masayuki (ed.), Topics in cryptology – CT-RSA 2007. The cryptographers’ track at the RSA conference 2007, San Francisco, CA, USA, February 5-9, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-69327-7/pbk). Lecture Notes in Computer Science 4377, 178-195 (2006).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

An efficient static blind ring signature scheme. (English) Zbl 1185.94084

Won, Dongho (ed.) et al., Information security and cryptology – ICISC 2005. 8th international conference, Seoul, Korea, December 1–2, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-33354-1/pbk). Lecture Notes in Computer Science 3935, 410-423 (2006).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

\(t\)-out-of-\(n\) string/bit oblivious transfers revisited. (English) Zbl 1118.68487

Deng, Robert H. (ed.) et al., Information security practice and experience. First international conference, ISPEC 2005, Singapore, April 11–14, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25584-2/pbk). Lecture Notes in Computer Science 3439, 410-421 (2005).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Shared-key signature and its application to anonymous authentication in ad hoc group. (English) Zbl 1109.68492

Zhang, Kan (ed.) et al., Information security. 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27–29, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23208-7/pbk). Lecture Notes in Computer Science 3225, 330-341 (2004).
MSC:  68P25 94A62
PDFBibTeX XMLCite
Full Text: DOI

Distributed mobile communication base station diagnosis and monitoring using multi-agents. (English) Zbl 1020.68624

Yin, Hujun (ed.) et al., Intelligent data engineering and automated learning - IDEAL 2002. Third international conference, Manchester, UK, August 12-14, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2412, 267-272 (2002).
PDFBibTeX XMLCite
Full Text: Link

Filter Results by …

Document Type

Database

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software