Publication | Date of Publication | Type |
---|
Structured encryption for knowledge graphs | 2024-03-07 | Paper |
Practical and malicious private set intersection with improved efficiency | 2024-03-01 | Paper |
Leakage-resilient identity-based cryptography from minimal assumptions | 2023-11-07 | Paper |
An Efficient and Provably Secure Private Polynomial Evaluation Scheme | 2023-06-30 | Paper |
Efficient Traceable Oblivious Transfer and Its Applications | 2023-06-30 | Paper |
Group-Based Source-Destination Verifiable Encryption with Blacklist Checking | 2022-12-09 | Paper |
Novel generic construction of leakage-resilient PKE scheme with CCA security | 2021-06-24 | Paper |
Improvement of attribute-based encryption using Blakley secret sharing | 2021-06-08 | Paper |
Privacy-enhanced remote data integrity checking with updatable timestamp | 2021-04-19 | Paper |
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation | 2020-10-07 | Paper |
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters | 2020-09-22 | Paper |
Privacy-enhanced attribute-based private information retrieval | 2020-09-08 | Paper |
Witness-based searchable encryption | 2020-09-08 | Paper |
A code-based signature scheme from the Lyubashevsky framework | 2020-08-17 | Paper |
A generic scheme of plaintext-checkable database encryption | 2020-07-20 | Paper |
Revocable identity-based encryption with server-aided ciphertext evolution | 2020-04-06 | Paper |
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security | 2020-01-29 | Paper |
Provably secure proactive secret sharing without the adjacent assumption | 2020-01-10 | Paper |
Quantum private set intersection cardinality and its application to anonymous authentication | 2020-01-06 | Paper |
Novel updatable identity-based hash proof system and its applications | 2019-12-27 | Paper |
Provably Secure (Broadcast) Homomorphic Signcryption | 2019-12-10 | Paper |
ACE with Compact Ciphertext Size and Decentralized Sanitizers | 2019-12-10 | Paper |
Strongly leakage resilient authenticated key exchange, revisited | 2019-11-07 | Paper |
Continuous leakage-resilient identity-based encryption with leakage amplification | 2019-09-12 | Paper |
The generic construction of continuous leakage-resilient identity-based cryptosystems | 2019-05-17 | Paper |
Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems | 2019-03-26 | Paper |
A privacy preserving source verifiable encryption scheme | 2018-12-07 | Paper |
Efficient attribute-based encryption with blackbox traceability | 2018-11-07 | Paper |
Deniable ring authentication based on projective hash functions | 2018-11-07 | Paper |
Provably secure homomorphic signcryption | 2018-11-07 | Paper |
Policy controlled system with anonymity | 2018-09-24 | Paper |
Introduction to Security Reduction | 2018-07-18 | Paper |
Identity-based quotable ring signature | 2018-05-17 | Paper |
One-Round Attribute-Based Key Exchange in the Multi-Party Setting | 2018-02-23 | Paper |
Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost | 2018-02-06 | Paper |
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample | 2017-11-15 | Paper |
Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query | 2017-10-24 | Paper |
Strong authenticated key exchange with auxiliary inputs | 2017-09-15 | Paper |
A note on the strong authenticated key exchange with auxiliary inputs | 2017-09-15 | Paper |
Privacy-preserving \(k\)-time authenticated secret handshakes | 2017-08-25 | Paper |
Hierarchical functional encryption for linear transformations | 2017-08-25 | Paper |
Mergeable and revocable identity-based encryption | 2017-08-25 | Paper |
ID-based encryption with equality test against insider attack | 2017-08-25 | Paper |
A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange | 2017-07-28 | Paper |
Identity-Based Secure DistributedData Storage Schemes | 2017-06-20 | Paper |
Achieving IND-CCA Security for Functional Encryption for Inner Products | 2017-05-05 | Paper |
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions | 2017-02-01 | Paper |
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction | 2017-01-06 | Paper |
Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update | 2017-01-06 | Paper |
One-Round Attribute-Based Key Exchange in the Multi-party Setting | 2017-01-06 | Paper |
Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage | 2017-01-06 | Paper |
One-Round Strong Oblivious Signature-Based Envelope | 2016-09-02 | Paper |
Proxy Signature with Revocation | 2016-09-02 | Paper |
Content-Based Encryption | 2016-09-02 | Paper |
Public Key Encryption with Authorized Keyword Search | 2016-09-02 | Paper |
Linear Encryption with Keyword Search | 2016-09-02 | Paper |
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing | 2016-09-02 | Paper |
Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance | 2016-08-31 | Paper |
Threshold Broadcast Encryption with Keyword Search | 2016-07-25 | Paper |
Generalized closest substring encryption | 2016-06-27 | Paper |
Relations between robustness and RKA security under public-key encryption | 2016-04-13 | Paper |
Strongly Leakage-Resilient Authenticated Key Exchange | 2016-04-08 | Paper |
An efficient quantum scheme for private set intersection | 2016-04-04 | Paper |
Provably Secure Identity Based Provable Data Possession | 2016-01-27 | Paper |
Efficient dynamic threshold identity-based encryption with constant-size ciphertext | 2015-12-08 | Paper |
An Efficient Privacy-Preserving E-coupon System | 2015-11-25 | Paper |
Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks | 2015-11-20 | Paper |
A New General Framework for Secure Public Key Encryption with Keyword Search | 2015-10-20 | Paper |
Improved Identity-Based Online/Offline Encryption | 2015-10-20 | Paper |
A New Public Remote Integrity Checking Scheme with User Privacy | 2015-10-20 | Paper |
Complete Robustness in Identity-Based Encryption | 2015-09-29 | Paper |
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption | 2015-07-27 | Paper |
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents | 2015-06-25 | Paper |
Key management for Smart Grid based on asymmetric key-wrapping | 2015-06-24 | Paper |
Cardiovascular event risk dynamics over time in older patients on dialysis: A generalized multiple-index varying coefficient model approach | 2014-11-04 | Paper |
A New Signature Scheme Without Random Oracles from Bilinear Pairings | 2014-08-21 | Paper |
On security of a certificateless signcryption scheme | 2014-08-01 | Paper |
Efficient and dynamic key management for multiple identities in identity-based systems | 2014-08-01 | Paper |
Identity based identification from algebraic coding theory | 2014-01-13 | Paper |
k-time Proxy Signature: Formal Definition and Efficient Construction | 2013-10-23 | Paper |
Anonymous Signcryption against Linear Related-Key Attacks | 2013-10-23 | Paper |
Efficient and secure stored-value cards with leakage resilience | 2013-08-19 | Paper |
Membership Encryption and Its Applications | 2013-06-28 | Paper |
Provably secure proxy signature scheme from factorization | 2013-01-24 | Paper |
A provably secure authenticated key agreement protocol for wireless communications | 2012-10-19 | Paper |
Efficient oblivious transfers with access control | 2012-09-30 | Paper |
A Pre-computable Signature Scheme with Efficient Verification for RFID | 2012-06-29 | Paper |
An efficient dynamic authenticated key exchange protocol with selectable identities | 2011-09-18 | Paper |
Provably secure server-aided verification signatures | 2011-08-28 | Paper |
Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase | 2011-07-29 | Paper |
Electronic Cash with Anonymous User Suspension | 2011-07-07 | Paper |
Policy-Based Authentication for Mobile Agents | 2011-05-19 | Paper |
Certificateless threshold signature scheme from bilinear maps | 2011-01-28 | Paper |
Provably secure identity-based authenticated key agreement protocols with malicious private key generators | 2011-01-28 | Paper |
Towards a Cryptographic Treatment of Publish/Subscribe Systems | 2010-12-07 | Paper |
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships | 2010-07-13 | Paper |
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting | 2010-05-28 | Paper |
Escrowed Deniable Identification Schemes | 2010-04-23 | Paper |
How to Prove Security of a Signature with a Tighter Security Reduction | 2009-12-11 | Paper |
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? | 2009-12-11 | Paper |
Server-Controlled Identity-Based Authenticated Key Exchange | 2009-12-11 | Paper |
Universal Designated Verifier Signatures with Threshold-Signers | 2009-10-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q3639071 | 2009-10-28 | Paper |
Certificateless threshold ring signature | 2009-10-01 | Paper |
Enhanced Target Collision Resistant Hash Functions Revisited | 2009-08-11 | Paper |
Efficient Non-interactive Range Proof | 2009-07-23 | Paper |
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders | 2009-06-25 | Paper |
Asymmetric Group Key Agreement | 2009-05-12 | Paper |
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems | 2009-04-29 | Paper |
Publicly Verifiable Privacy-Preserving Group Decryption | 2009-04-29 | Paper |
Privacy for Private Key in Signatures | 2009-04-29 | Paper |
Multi-identity management for identity-based cryptography | 2009-04-28 | Paper |
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure | 2009-03-10 | Paper |
Concurrent Signatures without a Conventional Keystone | 2009-03-09 | Paper |
Certificateless Signature Revisited | 2009-03-06 | Paper |
Practical Compact E-Cash | 2009-03-06 | Paper |
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures | 2009-02-24 | Paper |
Identity-Based Online/Offline Encryption | 2009-02-12 | Paper |
Efficient Partially Blind Signatures with Provable Security | 2009-02-10 | Paper |
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility | 2009-02-10 | Paper |
Multi-Identity Single-Key Decryption without Random Oracles | 2009-02-10 | Paper |
Optimal Online/Offline Signature: How to Sign a Message without Online Computation | 2009-01-27 | Paper |
Server-Aided Verification Signatures: Definitions and New Constructions | 2009-01-27 | Paper |
Sanitizable Signatures Revisited | 2009-01-09 | Paper |
Constant-Size Dynamic k-TAA | 2008-11-27 | Paper |
Efficient generic on-line/off-line (threshold) signatures without key exposure | 2008-11-20 | Paper |
RFID Privacy Models Revisited | 2008-10-27 | Paper |
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings | 2008-09-09 | Paper |
Compact E-Cash from Bounded Accumulator | 2008-04-17 | Paper |
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles | 2008-04-15 | Paper |
A Generic Construction for Universally-Convertible Undeniable Signatures | 2008-04-15 | Paper |
New Construction of Group Secret Handshakes Based on Pairings | 2008-03-25 | Paper |
Formal Definition and Construction of Nominative Signature | 2008-03-25 | Paper |
Progress in Cryptology - INDOCRYPT 2003 | 2007-11-29 | Paper |
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length | 2007-11-29 | Paper |
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key | 2007-11-29 | Paper |
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security | 2007-09-07 | Paper |
Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures | 2007-09-04 | Paper |
Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |
Cryptology and Network Security | 2006-11-14 | Paper |
Information Security and Privacy | 2006-06-22 | Paper |
Information Security and Cryptology - ICISC 2003 | 2005-12-27 | Paper |
Financial Cryptography and Data Security | 2005-12-22 | Paper |
Information Security and Privacy | 2005-09-07 | Paper |
Information and Communications Security | 2005-08-19 | Paper |
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making | 2005-08-17 | Paper |
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making | 2005-08-17 | Paper |
Distributed Computing - IWDC 2004 | 2005-08-12 | Paper |
Applied Cryptography and Network Security | 2005-06-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4428349 | 2003-09-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q4412995 | 2003-07-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4788578 | 2003-05-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4945385 | 2002-04-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4945374 | 2002-03-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q2768655 | 2002-02-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q2762899 | 2002-01-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4409353 | 2002-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q2721165 | 2001-07-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q2707602 | 2001-04-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4501510 | 2000-09-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4945042 | 2000-08-24 | Paper |
On the design of efficient RSA-based off-line electronic cash schemes | 2000-08-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4251031 | 1999-11-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4250633 | 1999-06-17 | Paper |