Advances in Cryptology - ASIACRYPT 2003

From MaRDI portal
Publication:5902373

DOI10.1007/b94617zbMath1205.94075OpenAlexW2899867281MaRDI QIDQ5902373

David Pointcheval, Emmanuel Bresson, Dario Catalano

Publication date: 5 January 2010

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b94617




Related Items (30)

Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud IntegrationLabeled homomorphic encryption. Scalable and privacy-preserving processing of outsourced dataPrivacy-preserving multikey computing framework for encrypted data in the cloudOn-line/off-line DCR-based homomorphic encryption and applicationsZero-knowledge arguments for subverted RSA groupsOn Constructing Pairing-Free Identity-Based EncryptionsA bivariate polynomial-based cryptographic hard problem and its applicationsTowards practical topology-hiding computationA new public key cryptosystem over ℤn2*Expressive query over outsourced encrypted dataPrivacy-preserving outsourcing of image feature extraction in cloud computingPractical fully secure unrestricted inner product functional encryption modulo \(p\)Short undeniable signatures based on group homomorphismsGroup EncryptionAn applications of signed quadratic residues in public key cryptographyNew Constructions and Applications of Trapdoor DDH GroupsOn the security of public key cryptosystems with a double decryption mechanismPlaintext checkable encryption with designated checkerLinearly Homomorphic Encryption from $$\mathsf {DDH}$$Privacy preserving anomaly detection based on local density estimationEncrypted data processing with homomorphic re-encryptionA new approach for UC security concurrent deniable authenticationThe rise of Paillier: homomorphic secret sharing and public-key silent OTConstructing Universally Composable Oblivious Transfers from Double Trap-Door EncryptionsHybrid commitments and their applications to zero-knowledge proof systemsFully Secure Functional Encryption for Inner Products, from Standard AssumptionsRound Optimal Universally Composable Oblivious Transfer ProtocolsSecurity analysis and improvement of a double-trapdoor encryption schemeOptimally Sound Sigma Protocols Under DCRAA Simpler Rate-Optimal CPIR Protocol






This page was built for publication: Advances in Cryptology - ASIACRYPT 2003