Advances in Cryptology – CRYPTO 2004

From MaRDI portal
Revision as of 22:19, 8 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5311552

DOI10.1007/B99099zbMath1104.94044DBLPconf/crypto/2004OpenAlexW2477011922WikidataQ27980744 ScholiaQ27980744MaRDI QIDQ5311552

Hovav Shacham, Xavier Boyen, Dan Boneh

Publication date: 23 August 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b99099




Related Items (only showing first 100 items - show all)

Short Attribute-Based Signatures for Threshold PredicatesPlaintext-Checkable EncryptionWitness Maps and ApplicationsCompact Privacy Protocols from Post-quantum and Timed Classical AssumptionsPublic-Key Encryption with Simulation-Based Selective-Opening Security and Compact CiphertextsAmbiguous One-Move Nominative Signature Without Random OraclesIBE Under $$k$$-LIN with Shorter Ciphertexts and Private KeysGeneric Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage ResiliencyConstant Size Ring Signature Without Random OracleEfficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed TraceabilityA Dynamic Attribute-Based Authentication SchemeAnonymous Data Collection System with MediatorsFully adaptive decentralized multi-authority \textsf{ABE}Private polynomial commitments and applications to MPCTracing a linear subspace: application to linearly-homomorphic group signaturesStructure-Preserving Smooth Projective HashingSignature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice AssumptionsNIZKs with an Untrusted CRS: Security in the Face of Parameter SubversionA Shuffle Argument Secure in the Generic ModelAn Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access StructuresRevisiting BBS signaturesA CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linBatch arguments for \textsf{NP} and more from standard bilinear group assumptionsTraceable Identity-Based Group SignatureRelaxed Lattice-Based Signatures with Short Zero-Knowledge ProofsAnonymous yet Traceable Strong Designated Verifier SignatureStrongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard AssumptionsAttribute-Based Encryption with Partially Hidden Encryptor-Specified Access StructuresThe Kernel Matrix Diffie-Hellman AssumptionEfficient Public-Key Cryptography with Bounded Leakage and Tamper ResiliencePublic-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary FunctionsA Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage SettingExpanded Framework for Dual System Encryption and Its ApplicationPrivacy Preserving Data Mining within Anonymous Credential SystemsA Universally Composable Group Key Exchange Protocol with Minimum Communication EffortFully Anonymous Group Signatures Without Random OraclesGroup EncryptionPAChain: Private, Authenticated and Auditable Consortium BlockchainDefending against Key Abuse Attacks in KP-ABE Enabled Broadcast SystemsSelf-organized Anonymous Authentication in Mobile Ad Hoc NetworksEfficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRSTagged One-Time Signatures: Tight Security and Optimal Tag SizeEfficient Completely Context-Hiding Quotable and Linearly Homomorphic SignaturesVerifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VESVerifiable Elections That Scale for FreeAlgebraic curves and cryptographyAnalysis on a generalized algorithm for the strong discrete logarithm problem with auxiliary inputsCCA-Secure Inner-Product Functional Encryption from Projective Hash FunctionsScalable Multi-party Private Set-IntersectionStructure-Preserving Chosen-Ciphertext Security with Shorter Verifiable CiphertextsNon-malleable Codes with Split-State RefreshConcurrently Composable Security with Shielded Super-Polynomial SimulatorsA New Dynamic Code-Based Group Signature SchemeEfficient Confirmer Signatures from the “Signature of a Commitment” ParadigmAn Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s ReputationGroup signatures and more from isogenies and lattices: generic, simple, and efficientSecurity Analysis of the Strong Diffie-Hellman ProblemCompact Group Signatures Without Random OraclesFully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private KeysUnlinkable Randomizable Signature and Its Application in Group SignatureAmbiguous Optimistic Fair ExchangeUniversally Composable Adaptive Oblivious TransferPairings in Trusted ComputingHomomorphic Encryption and Signatures from Vector DecompositionHidden-Vector Encryption with Groups of Prime OrderNo-signaling linear PCPsContinuously non-malleable codes with split-state refreshNo-signaling linear PCPsDiscrete logarithm problems with auxiliary inputsNon-interactive Confirmer SignaturesAttribute-Based SignaturesUniversally Anonymous IBE Based on the Quadratic Residuosity AssumptionKey-Private Proxy Re-encryptionDynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential SystemsPractical Short Signature Batch VerificationA Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext AttacksMinicrypt primitives with algebraic structure and applicationsDeterministic Public-Key Encryption Under Continual LeakageSimulatable Adaptive Oblivious Transfer with Statistical Receiver’s PrivacySecure Obfuscation of Encrypted Verifiable Encrypted SignaturesProofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of SignaturesForward-Secure Group Signatures from PairingsEfficient Traceable Signatures in the Standard ModelUniversally Composable Adaptive Priced Oblivious TransferNon-zero Inner Product Encryption with Short Ciphertexts and Private KeysTowards Restricting Plaintext Space in Public Key EncryptionFully Secure Functional Encryption for Inner Products, from Standard AssumptionsDesign in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion Using Integer ProgrammingPrivacy-Aware Attribute-Based Encryption with User AccountabilityBlock-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient AttributesDesignated Confirmer Signatures with Unified VerificationGeneralized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman ProblemDigital SignaturesAn Efficient Self-blindable Attribute-Based Credential SchemeCryptographic Voting — A Gentle IntroductionSurvey of Lattice-Based Group SignatureAdequate Elliptic Curves for Computing the Product of n PairingsA Practical Group Signature Scheme Based on Rank MetricA scalable post-quantum hash-based group signature







This page was built for publication: Advances in Cryptology – CRYPTO 2004