scientific article; zbMATH DE number 2081087
From MaRDI portal
zbMath1064.94553MaRDI QIDQ4474200
Mihir Bellare, David Pointcheval, Alexandra Boldyreva, Anand Desai
Publication date: 4 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2248/22480566.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items
Security analysis of a password-based authentication protocol proposed to IEEE 1363, Relations between robustness and RKA security under public-key encryption, Private authentication, A secure anonymous proxy signcryption scheme, Hidden shift quantum cryptanalysis and implications, Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved, KHAPE: Asymmetric PAKE from key-hiding key exchange, Group-Based Source-Destination Verifiable Encryption with Blacklist Checking, Semantic Security and Key-Privacy with Random Split of St-Gen Codes, Multi-designated receiver signed public key encryption, Anonymous, robust post-quantum public key encryption, Anonymity of NIST PQC round 3 KEMs, Reconciling non-malleability with homomorphic encryption, How to Leak a Secret and Reap the Rewards Too, Bonsai trees, or how to delegate a lattice basis, Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption, Randomized half-ideal cipher on groups with applications to UC (a)PAKE, One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity, Post-quantum anonymity of Kyber, On access control encryption without sanitization, Anonymous authenticated communication, Strongly anonymous ratcheted key exchange, Privacy-preserving authenticated key exchange in the standard model, Anonymous public key encryption under corruptions, Key-oblivious encryption from isogenies with application to accountable tracing signatures, Protego: efficient, revocable and auditable anonymous credentials with applications to hyperledger fabric, Epoch confidentiality in updatable encryption, Relations between semantic security and anonymity in identity-based encryption, Simulatable channels: extended security that is universally composable and easier to prove, Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption, Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more, Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups, On the Key-Privacy Issue of McEliece Public-Key Encryption, Group Encryption, Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity, Anonymous spatial encryption under affine space delegation functionality with full security, Robust encryption, Robust Encryption, Revisited, Access Control Encryption for Equality, Comparison, and More, Generic construction of designated tester public-key encryption with keyword search, Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities, A general compiler for password-authenticated group key exchange protocol, ACE with Compact Ciphertext Size and Decentralized Sanitizers, Public Key Encryption with Searchable Keywords Based on Jacobi Symbols, Match me if you can: matchmaking encryption and its applications, Universally Anonymous IBE Based on the Quadratic Residuosity Assumption, Key-Private Proxy Re-encryption, Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption, Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security, Topology-hiding computation for networks with unknown delays, Building Key-Private Public-Key Encryption Schemes, Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions, New RSA-Based (Selectively) Convertible Undeniable Signature Schemes, Anonymity from Public Key Encryption to Undeniable Signatures, Group encryption: full dynamicity, message filtering and code-based instantiation, New Anonymity Notions for Identity-Based Encryption, New Anonymity Notions for Identity-Based Encryption, Robust Encryption, KEMTLS with delayed forward identity protection in (almost) a single round trip, Anonymous protocols: notions and equivalence, A public key cryptosystem and a signature scheme based on discrete logarithms