scientific article; zbMATH DE number 2081087

From MaRDI portal
Revision as of 06:12, 7 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4474200

zbMath1064.94553MaRDI QIDQ4474200

Mihir Bellare, David Pointcheval, Alexandra Boldyreva, Anand Desai

Publication date: 4 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2248/22480566.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.





Related Items (71)

Security analysis of a password-based authentication protocol proposed to IEEE 1363Relations between robustness and RKA security under public-key encryptionPrivate authenticationA secure anonymous proxy signcryption schemeHidden shift quantum cryptanalysis and implicationsReceiver-anonymity in rerandomizable RCCA-secure cryptosystems resolvedKHAPE: Asymmetric PAKE from key-hiding key exchangeGroup-Based Source-Destination Verifiable Encryption with Blacklist CheckingSemantic Security and Key-Privacy with Random Split of St-Gen CodesMulti-designated receiver signed public key encryptionAnonymous, robust post-quantum public key encryptionAnonymity of NIST PQC round 3 KEMsReconciling non-malleability with homomorphic encryptionHow to Leak a Secret and Reap the Rewards TooBonsai trees, or how to delegate a lattice basisZero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group EncryptionRandomized half-ideal cipher on groups with applications to UC (a)PAKEOne-time encryption-key technique for the traditional DL-based encryption scheme with anonymityPost-quantum anonymity of KyberOn access control encryption without sanitizationAnonymous authenticated communicationStrongly anonymous ratcheted key exchangePrivacy-preserving authenticated key exchange in the standard modelAnonymous public key encryption under corruptionsKey-oblivious encryption from isogenies with application to accountable tracing signaturesProtego: efficient, revocable and auditable anonymous credentials with applications to hyperledger fabricEpoch confidentiality in updatable encryptionRelations between semantic security and anonymity in identity-based encryptionSimulatable channels: extended security that is universally composable and easier to proveZero-knowledge arguments for matrix-vector relations and lattice-based group encryptionRevocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and moreTransforming Hidden Vector Encryption Schemes from Composite to Prime Order GroupsOn the Key-Privacy Issue of McEliece Public-Key EncryptionGroup EncryptionExtended Galbraith's test on the anonymity of IBE schemes from higher residuosityAnonymous spatial encryption under affine space delegation functionality with full securityRobust encryptionRobust Encryption, RevisitedAccess Control Encryption for Equality, Comparison, and MoreGeneric construction of designated tester public-key encryption with keyword searchSecurity and Anonymity of Identity-Based Encryption with Multiple Trusted AuthoritiesBroadcast Authenticated Encryption with Keyword SearchA general compiler for password-authenticated group key exchange protocolRevocable IBE with En-DKER from lattices: a novel approach for lattice basis delegationCode-based secret handshake scheme, revisitedCovercrypt: an efficient early-abort KEM for hidden access policies with traceability from the DDH and LWEACE with Compact Ciphertext Size and Decentralized SanitizersShort concurrent covert authenticated key exchange (short cAKE)CASE: a new frontier in public-key authenticated encryptionA secure hierarchical deterministic wallet with stealth address from latticesGroup encryption: full dynamicity, message filtering and code-based instantiationPublic Key Encryption with Searchable Keywords Based on Jacobi SymbolsMatch me if you can: matchmaking encryption and its applicationsThe Boneh-Katz transformation, revisited: pseudorandom/obliviously-samplable PKE from lattices and codes and its applicationUniversally Anonymous IBE Based on the Quadratic Residuosity AssumptionKey-Private Proxy Re-encryptionAnamorphic encryption, revisitedComputationally Sound Formalization of Rerandomizable RCCA Secure EncryptionGeneric Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext SecurityTopology-hiding computation for networks with unknown delaysBuilding Key-Private Public-Key Encryption SchemesSearchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensionsNew RSA-Based (Selectively) Convertible Undeniable Signature SchemesAnonymity from Public Key Encryption to Undeniable SignaturesGroup encryption: full dynamicity, message filtering and code-based instantiationNew Anonymity Notions for Identity-Based EncryptionNew Anonymity Notions for Identity-Based EncryptionRobust EncryptionKEMTLS with delayed forward identity protection in (almost) a single round tripAnonymous protocols: notions and equivalenceA public key cryptosystem and a signature scheme based on discrete logarithms







This page was built for publication: