×

Found 249 Documents (Results 1–100)

100
MathJax

Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles. (English) Zbl 07493484

Sako, Kazue (ed.) et al., Applied cryptography and network security. 19th international conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12726, 3-27 (2021).
MSC:  68M25 94A60
PDF BibTeX XML Cite
Full Text: DOI

Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance. (English) Zbl 1479.94192

Garay, Juan A. (ed.), Public-key cryptography – PKC 2021. 24th IACR international conference on practice and theory of public key cryptography, virtual event, May 10–13, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12710, 596-626 (2021).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Impossibility on tamper-resilient cryptography with uniqueness properties. (English) Zbl 1479.94268

Garay, Juan A. (ed.), Public-key cryptography – PKC 2021. 24th IACR international conference on practice and theory of public key cryptography, virtual event, May 10–13, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12710, 389-420 (2021).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

An efficient CCA-secure access control encryption for any policy. (English) Zbl 1479.94346

Wu, Yongdong (ed.) et al., Information security and cryptology. 16th international conference, Inscrypt 2020, Guangzhou, China, December 11–14, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12612, 104-112 (2021).
MSC:  94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI

Generic construction of server-aided revocable hierarchical identity-based encryption. (English) Zbl 1479.94223

Wu, Yongdong (ed.) et al., Information security and cryptology. 16th international conference, Inscrypt 2020, Guangzhou, China, December 11–14, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12612, 73-82 (2021).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Identity-based combined public key schemes for signature, encryption, and signcryption. (English) Zbl 1417.94090

Chandra, Peeyush (ed.) et al., Information technology and applied mathematics. ICITAM 2017, Haldia Institute of Technology, Haldia, India, October 30 – November 1, 2017. Singapore: Springer. Adv. Intell. Syst. Comput. 699, 3-22 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

SecHome: a secure large-scale smart home system using hierarchical identity based encryption. (English) Zbl 1452.94077

Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 339-351 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

New certificateless public key encryption secure against malicious KGC attacks in the standard model. (English) Zbl 1452.94094

Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 236-247 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Improved inner-product encryption with adaptive security and full attribute-hiding. (English) Zbl 1446.94114

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11273, 673-702 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Short variable length domain extenders with beyond birthday bound security. (English) Zbl 1446.94116

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 244-274 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security. (English) Zbl 1446.94133

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 213-243 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Memory lower bounds of reductions revisited. (English) Zbl 1423.94113

Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10820, 61-90 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Tightly secure IBE under constant-size master public key. (English) Zbl 1404.94051

Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-54364-1/pbk; 978-3-662-54365-8/ebook). Lecture Notes in Computer Science 10174, 207-231 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters. (English) Zbl 1383.94049

Handschuh, Helena (ed.), Topics in cryptology – CT-RSA 2017. The cryptographers’ track at the RSA conference 2017, San Francisco, CA, USA, February 14–17, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-52152-7/pbk; 978-3-319-52153-4/ebook). Lecture Notes in Computer Science 10159, 432-449 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Adequate elliptic curves for computing the product of \(n\) pairings. (English) Zbl 1409.94875

Duquesne, Sylvain (ed.) et al., Arithmetic of finite fields. 6th international workshop, WAIFI 2016, Ghent, Belgium, July 13–15, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10064, 36-53 (2016).
MSC:  94A60 11G20
PDF BibTeX XML Cite
Full Text: DOI

Cryptographic reverse firewall via malleable smooth projective hash functions. (English) Zbl 1404.94052

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 844-876 (2016).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

The kernel matrix Diffie-Hellman assumption. (English) Zbl 1404.94100

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 729-758 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Iterated random oracle: a universal approach for finding loss in security reduction. (English) Zbl 1407.94115

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 745-776 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Partitioning via non-linear polynomial functions: more compact IBEs from ideal lattices and bilinear maps. (English) Zbl 1407.94126

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 682-712 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Efficient IBE with tight reduction to standard assumption in the multi-challenge setting. (English) Zbl 1407.94111

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 624-654 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Verifiable functional encryption. (English) Zbl 1407.94078

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 557-587 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Towards tightly secure lattice short signature and id-based encryption. (English) Zbl 1407.94091

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 404-434 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Adaptive oblivious transfer and generalization. (English) Zbl 1407.94089

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 217-247 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI HAL

Semi-adaptive security and bundling functionalities made generic and easy. (English) Zbl 1400.94145

Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016, Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-53643-8/pbk; 978-3-662-53644-5/ebook). Lecture Notes in Computer Science 9986, 361-388 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Design in type-I, run in type-III: fast and scalable bilinear-type conversion using integer programming. (English) Zbl 1406.94018

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part III. Berlin: Springer (ISBN 978-3-662-53014-6/pbk; 978-3-662-53015-3/ebook). Lecture Notes in Computer Science 9816, 387-415 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Fuzzy signatures: relaxing requirements and a new construction. (English) Zbl 1348.94069

Manulis, Mark (ed.) et al., Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19–22, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). Lecture Notes in Computer Science 9696, 97-116 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Efficient completely non-malleable and RKA secure public key encryptions. (English) Zbl 1346.94126

Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 134-150 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Fully secure IBE with tighter reduction in prime order bilinear groups. (English) Zbl 1384.94115

Qing, Sihan (ed.) et al., Information and communications security. 17th international conference, ICICS 2015, Beijing, China, December 9–11, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-29813-9/pbk; 978-3-319-29814-6/ebook). Lecture Notes in Computer Science 9543, 260-268 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

CCA-secure keyed-fully homomorphic encryption. (English) Zbl 1388.94067

Cheng, Chen-Mou (ed.) et al., Public-key cryptography – PKC 2016. 19th IACR international conference on practice and theory in public-key cryptography, Taipei, Taiwan, March 6–9, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49383-0/pbk; 978-3-662-49384-7/ebook). Lecture Notes in Computer Science 9614, 70-98 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Filter Results by …

Document Type

Reviewing State

all top 5

Author

all top 5

Year of Publication

all top 3

Classification

all top 3

Software