Login / Signup
Public Key Cryptography
1998
2004
2008
2015
1998
2015
Keyphrases
Publications
2015
Emmanuela Orsini
,
Joop van de Pol
,
Nigel P. Smart
Bootstrapping BGV Ciphertexts with a Wider Choice of p and q.
Public Key Cryptography
(2015)
Dennis Hofheinz
,
Jessica Koch
,
Christoph Striecks
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting.
Public Key Cryptography
(2015)
Mihir Bellare
,
Sriram Keelveedhi
Interactive Message-Locked Encryption and Secure Deduplication.
Public Key Cryptography
(2015)
Sébastien Canard
,
David Pointcheval
,
Olivier Sanders
,
Jacques Traoré
Divisible E-Cash Made Practical.
Public Key Cryptography
(2015)
Nico Döttling
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification.
Public Key Cryptography
(2015)
Foteini Baldimtsi
,
Melissa Chase
,
Georg Fuchsbauer
,
Markulf Kohlweiss
Anonymous Transferable E-Cash.
Public Key Cryptography
(2015)
Mihir Bellare
,
Viet Tung Hoang
Adaptive Witness Encryption and Asymmetric Password-Based Cryptography.
Public Key Cryptography
(2015)
Baodong Qin
,
Shengli Liu
,
Tsz Hon Yuen
,
Robert H. Deng
,
Kefei Chen
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security.
Public Key Cryptography
(2015)
Ignacio Cascudo
,
Ivan Damgård
,
Bernardo Machado David
,
Irene Giacomelli
,
Jesper Buus Nielsen
,
Roberto Trifiletti
Additively Homomorphic UC Commitments with Optimal Amortized Overhead.
Public Key Cryptography
(2015)
Michel Abdalla
,
Fabrice Benhamouda
,
David Pointcheval
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks.
Public Key Cryptography
(2015)
Romain Gay
,
Pierrick Méaux
,
Hoeteck Wee
Predicate Encryption for Multi-dimensional Range Queries from Lattices.
Public Key Cryptography
(2015)
Alain Couvreur
,
Ayoub Otmani
,
Jean-Pierre Tillich
,
Valérie Gauthier-Umaña
A Polynomial-Time Attack on the BBCRS Scheme.
Public Key Cryptography
(2015)
Jean-Charles Faugère
,
Danilo Gligoroski
,
Ludovic Perret
,
Simona Samardjiska
,
Enrico Thomae
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems.
Public Key Cryptography
(2015)
Marta Conde Pena
,
Jean-Charles Faugère
,
Ludovic Perret
Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case.
Public Key Cryptography
(2015)
Vadim Lyubashevsky
,
Daniel Wichs
Simple Lattice Trapdoor Sampling from a Broad Class of Distributions.
Public Key Cryptography
(2015)
Robert Granger
,
Michael Scott
Faster ECC over \mathbb F_2^521-1.
Public Key Cryptography
(2015)
Florian Bergsma
,
Tibor Jager
,
Jörg Schwenk
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model.
Public Key Cryptography
(2015)
Jacob Alperin-Sheriff
Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions.
Public Key Cryptography
(2015)
Michel Abdalla
,
Florian Bourse
,
Angelo De Caro
,
David Pointcheval
Simple Functional Encryption Schemes for Inner Products.
Public Key Cryptography
(2015)
Pyrros Chaidos
,
Jens Groth
Making Sigma-Protocols Non-interactive Without Random Oracles.
Public Key Cryptography
(2015)
Olivier Blazy
,
Saqib A. Kakvi
,
Eike Kiltz
,
Jiaxin Pan
Tightly-Secure Signatures from Chameleon Hash Functions.
Public Key Cryptography
(2015)
Shashank Agrawal
,
Shweta Agrawal
,
Saikrishna Badrinarayanan
,
Abishek Kumarasubramanian
,
Manoj Prabhakaran
,
Amit Sahai
On the Practical Security of Inner Product Functional Encryption.
Public Key Cryptography
(2015)
Felix Heuer
,
Tibor Jager
,
Eike Kiltz
,
Sven Schäge
On the Selective Opening Security of Practical Public-Key Encryption Schemes.
Public Key Cryptography
(2015)
Ryo Hiromasa
,
Masayuki Abe
,
Tatsuaki Okamoto
Packing Messages and Optimizing Bootstrapping in GSW-FHE.
Public Key Cryptography
(2015)
Mihir Bellare
,
Rafael Dowsley
,
Sriram Keelveedhi
How Secure is Deterministic Encryption?
Public Key Cryptography
(2015)
Gilles Barthe
,
Edvard Fagerholm
,
Dario Fiore
,
Andre Scedrov
,
Benedikt Schmidt
,
Mehdi Tibouchi
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds.
Public Key Cryptography
(2015)
San Ling
,
Khoa Nguyen
,
Huaxiong Wang
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based.
Public Key Cryptography
(2015)
Shengli Liu
,
Kenneth G. Paterson
Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms.
Public Key Cryptography
(2015)
David Bernhard
,
Marc Fischlin
,
Bogdan Warinschi
Adaptive Proofs of Knowledge in the Random Oracle Model.
Public Key Cryptography
(2015)
Shuji Kijima
,
Ravi Montenegro
Collision of Random Walks and a Refined Analysis of Attacks on the Discrete Logarithm Problem.
Public Key Cryptography
(2015)
Allison B. Lewko
,
Sarah Meiklejohn
A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups.
Public Key Cryptography
(2015)
Phong Q. Nguyen
,
Jiang Zhang
,
Zhenfeng Zhang
Simpler Efficient Group Signatures from Lattices.
Public Key Cryptography
(2015)
Sebastian Faust
,
Pratyay Mukherjee
,
Jesper Buus Nielsen
,
Daniele Venturi
A Tamper and Leakage Resilient von Neumann Architecture.
Public Key Cryptography
(2015)
David Cash
,
Rafael Dowsley
,
Eike Kiltz
Digital Signatures from Strong RSA without Prime Generation.
Public Key Cryptography
(2015)
Jan Camenisch
,
Robert R. Enderlein
,
Gregory Neven
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions.
Public Key Cryptography
(2015)
Benoît Libert
,
Marc Joye
,
Moti Yung
,
Thomas Peters
Secure Efficient History-Hiding Append-Only Signatures in the Standard Model.
Public Key Cryptography
(2015)
volume 9020, 2015
Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings
Public Key Cryptography
9020 (2015)
2014
Elena Kirshanova
Proxy Re-encryption from Lattices.
Public Key Cryptography
(2014)
Benoît Libert
,
Moti Yung
,
Marc Joye
,
Thomas Peters
Traceable Group Encryption.
Public Key Cryptography
(2014)
Eike Kiltz
,
Daniel Masny
,
Krzysztof Pietrzak
Simple Chosen-Ciphertext Security from Low-Noise LPN.
Public Key Cryptography
(2014)
Yong Li
,
Sven Schäge
,
Zheng Yang
,
Florian Kohlar
,
Jörg Schwenk
On the Security of the Pre-shared Key Ciphersuites of TLS.
Public Key Cryptography
(2014)
Mihir Bellare
,
Georg Fuchsbauer
Policy-Based Signatures.
Public Key Cryptography
(2014)
Nishanth Chandran
,
Melissa Chase
,
Feng-Hao Liu
,
Ryo Nishimaki
,
Keita Xagawa
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices.
Public Key Cryptography
(2014)
Prabhanjan Ananth
,
Nishanth Chandran
,
Vipul Goyal
,
Bhavana Kanukurthi
,
Rafail Ostrovsky
Achieving Privacy in Verifiable Computation with Multiple Servers - Without FHE and without Pre-processing.
Public Key Cryptography
(2014)
Kenneth G. Paterson
,
Jacob C. N. Schuldt
,
Dale L. Sibborn
Related Randomness Attacks for Public Key Encryption.
Public Key Cryptography
(2014)
Florian Böhl
,
Gareth T. Davies
,
Dennis Hofheinz
Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks.
Public Key Cryptography
(2014)
Stefano Tessaro
,
David A. Wilson
Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts.
Public Key Cryptography
(2014)
Alex Escala
,
Javier Herranz
,
Benoît Libert
,
Carla Ràfols
Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications.
Public Key Cryptography
(2014)
Jean-Sébastien Coron
,
Tancrède Lepoint
,
Mehdi Tibouchi
Scale-Invariant Fully Homomorphic Encryption over the Integers.
Public Key Cryptography
(2014)
volume 8383, 2014
Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings
Public Key Cryptography
8383 (2014)