Public Key Cryptography - PKC 2005

From MaRDI portal
Publication:5711583

DOI10.1007/b105124zbMath1081.94521OpenAlexW2506201965MaRDI QIDQ5711583

Aleksandr Yampolskiy, Yevgeniy Dodis

Publication date: 7 December 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b105124




Related Items (48)

Balancing privacy and accountability in blockchain identity managementProvably secure group key management scheme based on proxy re-encryption with constant public bulletin size and key derivation timeAdaptively secure distributed PRFs from LWEImplementing secure reporting of sexual misconduct -- revisiting WhoTooPoSAT: proof-of-work availability and unpredictability, without the workPractical post-quantum few-time verifiable random function with applications to AlgorandA fast and simple partially oblivious PRF, with applicationsExplainable argumentsAnonymous tokens with public metadata and applications to private contact tracingDéjà Q All Over Again: Tighter and Broader Reductions of q-Type AssumptionsMultiparty non-interactive key exchange and more from isogenies on elliptic curvesElliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey(Efficient) universally composable oblivious transfer using a minimal number of stateless tokensEncapsulated search index: public-key, sub-linear, distributed, and delegatableLogarithmic-size (linkable) threshold ring signatures in the plain modelObtaining simulation extractable NIZKs in the updatable CRS model genericallyShort signatures without random oracles and the SDH assumption in bilinear groupsAdaptive-Secure VRFs with Shorter Keys from Static AssumptionsThe price of verifiability: lower bounds for verifiable random functionsPublic-key generation with verifiable randomnessA combinatorial approach to quantum random functionsSimulatable verifiable random function from the LWE assumptionOn the impossibility of structure-preserving deterministic primitivesSubversion-resilient signatures: definitions, constructions and applicationsOblivious polynomial evaluation and secure set-intersection from algebraic PRFsConstant Round Adaptively Secure Protocols in the Tamper-Proof Hardware ModelA Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast CommunicationSecurity Analysis of the Strong Diffie-Hellman ProblemPractical Identity-Based Encryption Without Random OraclesEfficient Protocols for Set Membership and Range ProofsUnidirectional Chosen-Ciphertext Secure Proxy Re-encryptionVerifiable random functions from non-interactive witness-indistinguishable proofsVerifiable Random Functions from Standard AssumptionsDiscrete logarithm problems with auxiliary inputsSub-linear Size Traceable Ring Signatures without Random OraclesAdaptively secure distributed PRFs from \(\mathsf{LWE}\)Verifiable random functions: relations to identity-based key encapsulation and new constructionsVerifiable Random Functions from Identity-Based Key EncapsulationAggregatable distributed key generationSimulatable Adaptive Oblivious Transfer with Statistical Receiver’s PrivacyBoneh-Boyen Signatures and the Strong Diffie-Hellman ProblemCompact E-Cash and Simulatable VRFs RevisitedTwo-server distributed ORAM with sublinear computation and constant roundsNon-zero Inner Product Encryption with Short Ciphertexts and Private KeysUnforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-EncryptionEfficient Rational Secret Sharing in Standard Communication NetworksTwo-sided malicious security for private intersection-sum with cardinalityDistribution and Polynomial Interpolation of the Dodis-Yampolskiy Pseudo-Random Function




This page was built for publication: Public Key Cryptography - PKC 2005