Advances in Cryptology - CRYPTO 2003

From MaRDI portal
Revision as of 03:46, 9 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5428115

DOI10.1007/b11817zbMath1122.94357OpenAlexW2480001466WikidataQ56235047 ScholiaQ56235047MaRDI QIDQ5428115

Jan Camenisch, Victor Shoup

Publication date: 28 November 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b11817




Related Items (62)

EPID with malicious revocationGroup Signatures with Decentralized TracingGroup-Based Source-Destination Verifiable Encryption with Blacklist CheckingA reduction of security notions in designated confirmer signaturesUC-secure and Contributory Password-Authenticated Group Key ExchangeGeneric plaintext equality and inequality proofsA secure scalar product protocol against malicious adversariesRate-limited secure function evaluationAmbiguous One-Move Nominative Signature Without Random OraclesPractical non-interactive publicly verifiable secret sharing with thousands of partiesGroup signatures and more from isogenies and lattices: generic, simple, and efficientOne-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard modelA fast and simple partially oblivious PRF, with applicationsEfficient Verifiable Partially-Decryptable Commitments from Lattices and ApplicationsA Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom FunctionPrivacy-preserving blueprintsProvably unforgeable threshold EdDSA with an offline participant and trustless setupRelaxed Lattice-Based Signatures with Short Zero-Knowledge ProofsVerifiable Decryption for Fully Homomorphic EncryptionI want to ride my \texttt{BICYCL} : \texttt{BICYCL} implements cryptography in class groupsDining Cryptographers with 0.924 Verifiable Collision ResolutionSmooth projective hashing and two-message oblivious transferUniversally composable \(\varSigma \)-protocols in the global random-oracle modelFair exchange of valuable information: a generalised frameworkPractical chosen ciphertext secure encryption from factoringPractical fully secure unrestricted inner product functional encryption modulo \(p\)Provably Secure Fair Mutual Private Set Intersection Cardinality Utilizing Bloom FilterOn the impossibility of structure-preserving deterministic primitivesLossy trapdoor functions from homomorphic reproducible encryptionNew Realizations of Efficient and Secure Private Set Intersection Protocols Preserving FairnessGroup EncryptionAll-but-many encryptionEfficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRSNew Constructions and Applications of Trapdoor DDH GroupsFair signature exchange via delegation on ubiquitous networksOne-Shot Verifiable Encryption from LatticesEfficient Confirmer Signatures from the “Signature of a Commitment” ParadigmA Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)Group signatures and more from isogenies and lattices: generic, simple, and efficientTime-selective convertible undeniable signatures with short conversion receiptsProvably Secure Identity-Based Undeniable Signatures with Selective and Universal ConvertibilitySecure and efficient multiparty private set intersection cardinalityFair Traceable Multi-Group SignaturesEfficient Simultaneous BroadcastOnline-Untransferable SignaturesA General, Flexible and Efficient Proof of Inclusion and ExclusionPractical Chosen Ciphertext Secure Encryption from FactoringA Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext AttacksOn the Portability of Generalized Schnorr ProofsBandwidth-efficient threshold EC-DSAFair Threshold Decryption with Semi-Trusted Third PartiesNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsImproving Practical UC-Secure Commitments Based on the DDH AssumptionTowards Restricting Plaintext Space in Public Key EncryptionFully Secure Functional Encryption for Inner Products, from Standard AssumptionsEfficiency Limitations for Σ-Protocols for Group HomomorphismsToward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based SignaturesEscrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using BitcoinTwo-sided malicious security for private intersection-sum with cardinalityAugmented Oblivious Polynomial Evaluation Protocol and Its ApplicationsAdaptive PartitioningCoin-based multi-party fair exchange




This page was built for publication: Advances in Cryptology - CRYPTO 2003