Public Key Cryptography - PKC 2006

From MaRDI portal
Publication:5898946

DOI10.1007/11745853zbMath1151.94485OpenAlexW4205680410MaRDI QIDQ5898946

Brent Waters, Emily S. Shen, Dan Boneh

Publication date: 2 May 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11745853




Related Items

Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage ResiliencyPublic key encryption with equality test in the standard modelKey regeneration-free ciphertext-policy attribute-based encryption and its applicationBroadcast encryption based non-interactive key distribution in MANETsA Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage ModelA CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash FunctionFormal Security Treatments for Signatures from Identity-Based EncryptionStrongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard AssumptionsPrivacy-preserving authenticated key exchange in the standard modelA Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage SettingNon-malleable vector commitments via local equivocabilitySigncryption schemes with threshold unsigncryption, and applicationsPublic key encryption with equality test from generic assumptions in the random oracle modelEfficient public key encryption with equality test in the standard modelBeyond eCK: perfect forward secrecy under actor compromise and ephemeral-key revealVerifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VESVerifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VESGeneric security-amplifying methods of ordinary digital signaturesAn identity-based strongly unforgeable signature without random oracles from bilinear pairingsNon-malleable vector commitments via local equivocabilityA Generic Construction for Universally-Convertible Undeniable SignaturesOne-Time Signatures and Chameleon Hash FunctionsCCA secure encryption supporting authorized equality test on ciphertexts in standard model and its applicationsBlack-box constructions of signature schemes in the bounded leakage settingPublic key encryption with equality test via hash proof systemStrongly unforgeable ring signature scheme from lattices in the standard model




This page was built for publication: Public Key Cryptography - PKC 2006