Advances in Cryptology - ASIACRYPT 2003
From MaRDI portal
Publication:5902373
DOI10.1007/b94617zbMath1205.94075OpenAlexW2899867281MaRDI QIDQ5902373
David Pointcheval, Emmanuel Bresson, Dario Catalano
Publication date: 5 January 2010
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b94617
Related Items (30)
Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration ⋮ Labeled homomorphic encryption. Scalable and privacy-preserving processing of outsourced data ⋮ Privacy-preserving multikey computing framework for encrypted data in the cloud ⋮ On-line/off-line DCR-based homomorphic encryption and applications ⋮ Zero-knowledge arguments for subverted RSA groups ⋮ On Constructing Pairing-Free Identity-Based Encryptions ⋮ A bivariate polynomial-based cryptographic hard problem and its applications ⋮ Towards practical topology-hiding computation ⋮ A new public key cryptosystem over ℤn2* ⋮ Expressive query over outsourced encrypted data ⋮ Privacy-preserving outsourcing of image feature extraction in cloud computing ⋮ Practical fully secure unrestricted inner product functional encryption modulo \(p\) ⋮ Short undeniable signatures based on group homomorphisms ⋮ Group Encryption ⋮ An applications of signed quadratic residues in public key cryptography ⋮ New Constructions and Applications of Trapdoor DDH Groups ⋮ On the security of public key cryptosystems with a double decryption mechanism ⋮ Plaintext checkable encryption with designated checker ⋮ Linearly Homomorphic Encryption from $$\mathsf {DDH}$$ ⋮ Privacy preserving anomaly detection based on local density estimation ⋮ Encrypted data processing with homomorphic re-encryption ⋮ A new approach for UC security concurrent deniable authentication ⋮ The rise of Paillier: homomorphic secret sharing and public-key silent OT ⋮ Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions ⋮ Hybrid commitments and their applications to zero-knowledge proof systems ⋮ Fully Secure Functional Encryption for Inner Products, from Standard Assumptions ⋮ Round Optimal Universally Composable Oblivious Transfer Protocols ⋮ Security analysis and improvement of a double-trapdoor encryption scheme ⋮ Optimally Sound Sigma Protocols Under DCRA ⋮ A Simpler Rate-Optimal CPIR Protocol
This page was built for publication: Advances in Cryptology - ASIACRYPT 2003