Publication | Date of Publication | Type |
---|
Time-based attribute-based proxy re-encryption with decryption key update | 2024-12-11 | Paper |
Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond | 2024-11-12 | Paper |
Non-interactive zero-knowledge functional proofs | 2024-09-13 | Paper |
Robust publicly verifiable covert security: limited information leakage and guaranteed correctness with low overhead | 2024-08-30 | Paper |
Optimizing rectangle and boomerang attacks: a unified and generic framework for key recovery | 2024-05-13 | Paper |
Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing | 2024-04-30 | Paper |
Identifying buckling resistance of reinforced concrete columns during inelastic deformation | 2024-04-23 | Paper |
Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance | 2024-02-28 | Paper |
Asymmetric group message franking: definitions and constructions | 2023-12-08 | Paper |
Predicate private set intersection with linear complexity | 2023-11-10 | Paper |
Generalized attack on ECDSA: known bits in arbitrary positions | 2023-11-07 | Paper |
Single-state distributed \(k\)-winners-take-all neural network model | 2023-09-08 | Paper |
Optimizing rectangle attacks: a unified and generic framework for key recovery | 2023-08-25 | Paper |
Anonymous public key encryption under corruptions | 2023-08-25 | Paper |
EHNP strikes back: analyzing SM2 implementations | 2023-06-02 | Paper |
Simulation-based bi-selective opening security for public key encryption | 2023-05-12 | Paper |
Simulatable verifiable random function from the LWE assumption | 2023-04-27 | Paper |
Two-pass authenticated key exchange with explicit authentication and tight security | 2023-03-21 | Paper |
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment | 2022-12-22 | Paper |
New Proof for BKP IBE Scheme and Improvement in the MIMC Setting | 2022-12-09 | Paper |
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles | 2022-10-28 | Paper |
On Low-Complexity Lattice Reduction Algorithms for Large-Scale MIMO Detection: The Blessing of Sequential Reduction | 2022-09-23 | Paper |
Attribute-based conditional proxy re-encryption in the standard model under LWE | 2022-06-24 | Paper |
Efficient and fully secure lattice-based IBE with equality test | 2022-06-08 | Paper |
Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting | 2022-04-22 | Paper |
Long Optimal and Small-Defect LRC Codes With Unbounded Minimum Distances | 2021-07-22 | Paper |
Robustly reusable fuzzy extractor with imperfect randomness | 2021-05-10 | Paper |
Scalable revocable identity-based signature over lattices in the standard model | 2021-04-14 | Paper |
Key regeneration-free ciphertext-policy attribute-based encryption and its application | 2021-03-31 | Paper |
Solving large-scale many-objective optimization problems by covariance matrix adaptation evolution strategy with scalable small subpopulations | 2021-03-18 | Paper |
A hybrid universal blind quantum computation | 2020-12-10 | Paper |
Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification | 2020-12-10 | Paper |
New Constructions of Subspace Codes Using Subsets of MRD Codes in Several Blocks | 2020-09-29 | Paper |
Notes on a provably-secure certificate-based encryption against malicious CA attacks | 2020-09-09 | Paper |
New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model | 2020-07-20 | Paper |
Collision resistant hashing from sub-exponential learning parity with noise | 2020-05-05 | Paper |
Differential Spectrum of Kasami Power Permutations Over Odd Characteristic Finite Fields | 2020-01-28 | Paper |
On Low-complexity Lattice Reduction Algorithms for Large-scale MIMO Detection: the Blessing of Sequential Reduction | 2019-12-12 | Paper |
Indistinguishability of pure orthogonal product states by LOCC | 2017-10-25 | Paper |
Tightly Secure IBE Under Constant-Size Master Public Key | 2017-06-13 | Paper |
Verifiable Computation over Large Database with Incremental Updates | 2017-05-16 | Paper |
On the security of two identity-based conditional proxy re-encryption schemes | 2016-11-04 | Paper |
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security | 2016-09-02 | Paper |
Towards semantically secure outsourcing of association rule mining on categorical data | 2016-07-08 | Paper |
CCA-Secure Keyed-Fully Homomorphic Encryption | 2016-04-13 | Paper |
Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof (Extended Abstract) | 2016-01-11 | Paper |
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond | 2015-12-10 | Paper |
Security Model and Analysis of FHMQV, Revisited | 2015-12-02 | Paper |
Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext | 2015-11-20 | Paper |
Fine-Grained Conditional Proxy Re-Encryption and Application | 2015-09-29 | Paper |
A note on the security of KHL scheme | 2015-09-25 | Paper |
Verifiable Computation over Large Database with Incremental Updates | 2015-07-24 | Paper |
Verifiable Computation on Outsourced Encrypted Data | 2015-07-24 | Paper |
Authorized Keyword Search on Encrypted Data | 2015-07-24 | Paper |
The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions | 2015-07-06 | Paper |
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model | 2015-02-19 | Paper |
Pseudorandom generators from regular one-way functions: new constructions with improved parameters | 2015-01-28 | Paper |
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model | 2014-09-29 | Paper |
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack | 2014-05-27 | Paper |
Adaptable Ciphertext-Policy Attribute-Based Encryption | 2014-02-18 | Paper |
Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles | 2014-01-24 | Paper |
Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters | 2013-12-10 | Paper |
Cryptanalysis of an identity based broadcast encryption scheme without random oracles | 2013-03-28 | Paper |
Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks | 2013-03-18 | Paper |
Accountable Authority Identity-Based Encryption with Public Traceability | 2013-03-18 | Paper |
Zero-knowledge argument for simultaneous discrete logarithms | 2012-11-21 | Paper |
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption | 2012-06-08 | Paper |
On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010 | 2011-03-15 | Paper |
Certificateless key-insulated signature without random oracles | 2011-02-02 | Paper |
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings | 2011-01-28 | Paper |
Cryptanalysis of a certificateless signcryption scheme in the standard model | 2011-01-28 | Paper |
Strong key-insulated signature in the standard model | 2011-01-05 | Paper |
Optionally Identifiable Private Handshakes | 2010-11-23 | Paper |
Generic Constructions of Parallel Key-Insulated Encryption | 2010-09-10 | Paper |
Zero-Knowledge Argument for Simultaneous Discrete Logarithms | 2010-07-20 | Paper |
Efficient Unidirectional Proxy Re-Encryption | 2010-05-04 | Paper |
Efficient discrete logarithm based multi-signature scheme in the plain public key model | 2010-02-25 | Paper |
Identity-Based Strong Key-Insulated Signature Without Random Oracles | 2010-02-12 | Paper |
Self-enforcing Private Inference Control | 2009-12-11 | Paper |
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security | 2009-09-29 | Paper |
Conditional Proxy Broadcast Re-Encryption | 2009-06-25 | Paper |
Identity-Based Key-Insulated Signature with Secure Key-Updates | 2009-01-15 | Paper |
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings | 2009-01-09 | Paper |
Identity-Based Threshold Key-Insulated Encryption without Random Oracles | 2008-04-24 | Paper |
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction | 2008-04-11 | Paper |
Pirate decoder for the broadcast encryption schemes from Crypto 2005 | 2007-10-12 | Paper |