×

Found 85 Documents (Results 1–85)

Fine-grained proxy re-encryption: definitions and constructions from LWE. (English) Zbl 07913472

Guo, Jian (ed.) et al., Advances in cryptology – ASIACRYPT 2023. 29th international conference on the theory and application of cryptology and information security, Guangzhou, China, December 4–8, 2023. Proceedings. Part VI. Singapore: Springer. Lect. Notes Comput. Sci. 14443, 199-231 (2023).
MSC:  94A60
Full Text: DOI

Almost tight multi-user security under adaptive corruptions from LWE in the standard model. (English) Zbl 1532.94048

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part V. Cham: Springer. Lect. Notes Comput. Sci. 14085, 682-715 (2023).
MSC:  94A60 94A62 68P25
Full Text: DOI

Almost tight multi-user security under adaptive corruptions & leakages in the standard model. (English) Zbl 07776100

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14006, 132-162 (2023).
MSC:  68M25 68P25 94A60
Full Text: DOI

EKE meets tight security in the universally composable framework. (English) Zbl 07770272

Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 685-713 (2023).
MSC:  68P25 94A60
Full Text: DOI

Privacy-preserving authenticated key exchange in the standard model. (English) Zbl 1519.94170

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13793, 210-240 (2023).
MSC:  94A60 94A62
Full Text: DOI

Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness. (English) Zbl 1514.94094

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13091, 483-513 (2021).
MSC:  94A60
Full Text: DOI

Authenticated key exchange and signatures with tight security in the standard model. (English) Zbl 1489.94123

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 12828, 670-700 (2021).
MSC:  94A62 94A60
Full Text: DOI

Two-pass authenticated key exchange with explicit authentication and tight security. (English) Zbl 1511.94184

Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12492, 785-814 (2020).
MSC:  94A62 94A60
Full Text: DOI

Tight leakage-resilient CCA-security from quasi-adaptive hash proof system. (English) Zbl 1507.68061

Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11693, 417-447 (2019).
MSC:  68M25 68P25 94A60
Full Text: DOI

Robustly reusable fuzzy extractor from standard assumptions. (English) Zbl 1447.94058

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11274, 459-489 (2018).
MSC:  94A60
Full Text: DOI

Tightly SIM-SO-CCA secure public key encryption from standard assumptions. (English) Zbl 1385.94058

Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-76577-8/pbk; 978-3-319-76578-5/ebook). Lecture Notes in Computer Science 10769, 62-92 (2018).
MSC:  94A60
Full Text: DOI

How to make the Cramer-Shoup cryptosystem secure against linear related-key attacks. (English) Zbl 1379.94049

Chen, Kefei (ed.) et al., Information security and cryptology. 12th international conference, Inscrypt 2016, Beijing, China, November 4–6, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-54704-6/pbk; 978-3-319-54705-3/ebook). Lecture Notes in Computer Science 10143, 150-165 (2017).
MSC:  94A60
Full Text: DOI

Efficient KDM-CCA secure public-key encryption for polynomial functions. (English) Zbl 1407.94118

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 307-338 (2016).
MSC:  94A60
Full Text: DOI

Continuous non-malleable key derivation and its application to related-key security. (English) Zbl 1345.94085

Katz, Jonathan (ed.), Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 557-578 (2015).
MSC:  94A60

Simulation-based selective opening CCA security for PKE from key encapsulation mechanisms. (English) Zbl 1319.94078

Katz, Jonathan (ed.), Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 3-26 (2015).
MSC:  94A60
Full Text: DOI

Security model and analysis of FHMQV, revisited. (English) Zbl 1347.94048

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 255-269 (2014).
MSC:  94A60 94A62 68P25
Full Text: DOI

Identity-based encryption secure against selective opening chosen-ciphertext attack. (English) Zbl 1326.94107

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 77-92 (2014).
MSC:  94A60
Full Text: DOI

Leakage-flexible CCA-secure public-key encryption: simple construction and free of pairing. (English) Zbl 1335.94074

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 19-36 (2014).
MSC:  94A60
Full Text: DOI

Leakage-resilient chosen-ciphertext secure public-key encryption from hash proof system and one-time lossy filter. (English) Zbl 1326.94117

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 381-400 (2013).
MSC:  94A60 68P25
Full Text: DOI

Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited. (English) Zbl 1314.94075

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 369-385 (2013).
MSC:  94A60 94A62
Full Text: DOI

Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks. (English) Zbl 1312.94071

Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 84-100 (2013).
MSC:  94A60
Full Text: DOI

Chameleon all-but-one TDFs and their application to chosen-ciphertext security. (English) Zbl 1291.94116

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 228-245 (2011).
MSC:  94A60 94A62
Full Text: DOI

Efficient CCA-secure PKE from identity-based techniques. (English) Zbl 1272.94047

Pieprzyk, Josef (ed.), Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11924-8/pbk). Lecture Notes in Computer Science 5985, 132-147 (2010).
MSC:  94A60

Chosen-ciphertext secure proxy re-encryption without pairings. (English) Zbl 1362.94026

Franklin, Matthew K. (ed.) et al., Cryptology and network security. 7th international conference, CANS 2008, Hong-Kong, China, December 2–4, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89640-1/pbk). Lecture Notes in Computer Science 5339, 1-17 (2008).
MSC:  94A60

Identity-based threshold key-insulated encryption without random oracles. (English) Zbl 1153.94437

Malkin, Tal (ed.), Topics in cryptology – CT-RSA 2008. The cryptographers’ track at the RSA conference 2008, San Francisco, CA, USA, April 8–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-79262-8/pbk). Lecture Notes in Computer Science 4964, 203-220 (2008).
MSC:  94A60
Full Text: DOI

Identity-based key-insulated signature with secure key-updates. (English) Zbl 1172.94629

Lipmaa, Helger (ed.) et al., Information security and cryptology. Second SKLOIS conference, Inscrypt 2006, Beijing, China, November 29–December 1, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49608-3/pbk). Lecture Notes in Computer Science 4318, 13-26 (2006).
MSC:  94A62 94A60
Full Text: DOI

Identity-based parallel key-insulated encryption without random oracles: Security notions and construction. (English) Zbl 1175.94120

Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 409-423 (2006).
MSC:  94A62 94A60
Full Text: DOI

Attack on identity-based broadcasting encryption schemes. (English) Zbl 1084.94516

Chen, Kefei (ed.), Progress on cryptography. 25 years of cryptography in China. Papers of an international workshop on progress on cryptography celebrating Guozhen Xiao’s 70th birthday. With a foreword by Xuejia Lai. Boston, MA: Kluwer Academic Publishers (ISBN 1-4020-7986-9/hbk). The Kluwer International Series in Engineering and Computer Science 769, 165-172 (2004).
MSC:  94A60

Cryptanalysis of LKK proxy signature. (English) Zbl 1084.94522

Chen, Kefei (ed.), Progress on cryptography. 25 years of cryptography in China. Papers of an international workshop on progress on cryptography celebrating Guozhen Xiao’s 70th birthday. With a foreword by Xuejia Lai. Boston, MA: Kluwer Academic Publishers (ISBN 1-4020-7986-9/hbk). The Kluwer International Series in Engineering and Computer Science 769, 161-164 (2004).
MSC:  94A62 94A60

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software