The following pages link to (Q4474200):
Displaying 50 items.
- Relations between robustness and RKA security under public-key encryption (Q266278) (← links)
- Anonymous spatial encryption under affine space delegation functionality with full security (Q506150) (← links)
- One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity (Q621579) (← links)
- Generic construction of designated tester public-key encryption with keyword search (Q713419) (← links)
- Security analysis of a password-based authentication protocol proposed to IEEE 1363 (Q818140) (← links)
- A general compiler for password-authenticated group key exchange protocol (Q990138) (← links)
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions (Q1021236) (← links)
- Hidden shift quantum cryptanalysis and implications (Q1633473) (← links)
- Simulatable channels: extended security that is universally composable and easier to prove (Q1710688) (← links)
- Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption (Q1711842) (← links)
- Robust encryption (Q1753165) (← links)
- Private authentication (Q1881255) (← links)
- Bonsai trees, or how to delegate a lattice basis (Q1928766) (← links)
- Relations between semantic security and anonymity in identity-based encryption (Q1944921) (← links)
- Topology-hiding computation for networks with unknown delays (Q2055692) (← links)
- Group encryption: full dynamicity, message filtering and code-based instantiation (Q2061981) (← links)
- KEMTLS with delayed forward identity protection in (almost) a single round trip (Q2096614) (← links)
- Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved (Q2139637) (← links)
- KHAPE: Asymmetric PAKE from key-hiding key exchange (Q2139655) (← links)
- Multi-designated receiver signed public key encryption (Q2170065) (← links)
- Anonymous, robust post-quantum public key encryption (Q2170096) (← links)
- Anonymity of NIST PQC round 3 KEMs (Q2170102) (← links)
- Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more (Q2215969) (← links)
- Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity (Q2227124) (← links)
- Anonymous protocols: notions and equivalence (Q2345446) (← links)
- Reconciling non-malleability with homomorphic encryption (Q2408582) (← links)
- A secure anonymous proxy signcryption scheme (Q2628122) (← links)
- Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security (Q2817814) (← links)
- How to Leak a Secret and Reap the Rewards Too (Q2946484) (← links)
- Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption (Q2953774) (← links)
- Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups (Q2988340) (← links)
- Semantic Security and Key-Privacy with Random Split of St-Gen Codes (Q3188246) (← links)
- Robust Encryption (Q3408211) (← links)
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities (Q3600515) (← links)
- Universally Anonymous IBE Based on the Quadratic Residuosity Assumption (Q3623033) (← links)
- Key-Private Proxy Re-encryption (Q3623052) (← links)
- Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption (Q3631375) (← links)
- Building Key-Private Public-Key Encryption Schemes (Q3634499) (← links)
- New RSA-Based (Selectively) Convertible Undeniable Signature Schemes (Q3637135) (← links)
- Anonymity from Public Key Encryption to Undeniable Signatures (Q3637142) (← links)
- A public key cryptosystem and a signature scheme based on discrete logarithms (Q3689092) (← links)
- Robust Encryption, Revisited (Q4916019) (← links)
- Group-Based Source-Destination Verifiable Encryption with Blacklist Checking (Q5056017) (← links)
- ACE with Compact Ciphertext Size and Decentralized Sanitizers (Q5205008) (← links)
- On the Key-Privacy Issue of McEliece Public-Key Encryption (Q5386092) (← links)
- Group Encryption (Q5387099) (← links)
- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols (Q5458216) (← links)
- Access Control Encryption for Equality, Comparison, and More (Q5738753) (← links)
- New Anonymity Notions for Identity-Based Encryption (Q5900461) (← links)
- New Anonymity Notions for Identity-Based Encryption (Q5902046) (← links)