Theory of Cryptography

From MaRDI portal
Publication:5711650

DOI10.1007/b106171zbMath1079.94534OpenAlexW4251449056WikidataQ59379672 ScholiaQ59379672MaRDI QIDQ5711650

Eu-Jin Goh, Kobbi Nissim, Dan Boneh

Publication date: 7 December 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b106171




Related Items (only showing first 100 items - show all)

Structure-preserving signatures and commitments to group elementsSelling multiple secrets to a single buyerTweakable block ciphers secure beyond the birthday bound in the ideal cipher modelPredicate encryption supporting disjunctions, polynomial equations, and inner productsFully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size CiphertextsUnconditionally anonymous ring and mesh signaturesA cryptographic primitive based on hidden-order groupsConstructive \(t\)-secure homomorphic secret sharing for low degree polynomialsEncrypted SQL arithmetic functions processing for secure cloud databaseFully leakage-resilient signaturesConstant Size Ring Signature Without Random OraclePGAS: privacy-preserving graph encryption for accurate constrained shortest distance queriesPrivacy-preserving computation in cyber-physical-social systems: a survey of the state-of-the-art and perspectivesComputing elliptic curve discrete logarithms with improved baby-step giant-step algorithmReconciling non-malleability with homomorphic encryptionSecret computation of purchase history data using somewhat homomorphic encryptionThreshold public key encryption scheme resilient against continual leakage without random oraclesAdaptive Oblivious Transfer and GeneralizationDéjà Q All Over Again: Tighter and Broader Reductions of q-Type AssumptionsConstant-Round Asynchronous Multi-Party Computation Based on One-Way FunctionsSecure Naïve Bayesian Classification over Encrypted Data in CloudAutomated analysis of cryptographic assumptions in generic group modelsSpreading alerts quietly and the subgroup escape problemHomomorphic extensions of CRT-based secret sharingPrivacy preserving multi-party computation delegation for deep learning in cloud computingGroup homomorphic encryption: characterizations, impossibility results, and applicationsEfficient traceable signatures in the standard modelImproved hidden vector encryption with short ciphertexts and tokensKey-policy attribute-based encryption against continual auxiliary input leakageFinding composite order ordinary elliptic curves using the Cocks-Pinch methodDual trapdoor identity-based encryption with keyword searchPrivacy-preserving outsourcing of image feature extraction in cloud computingVerifiable outsourced ciphertext-policy attribute-based encryption in cloud computingEfficient set operations in the presence of malicious adversariesLaconic private set intersection and applicationsHeuristics of the Cocks-Pinch methodAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsHomomorphic secret sharing for low degree polynomialsHierarchical attribute based encryption with continuous leakage-resilienceRestricted adaptive oblivious transferTransforming Hidden Vector Encryption Schemes from Composite to Prime Order GroupsNew Communication-Efficient Oblivious Transfer Protocols Based on PairingsSolving Discrete Logarithm Problem in an Interval Using Periodic IteratesQuadratic Error Minimization in a Distributed Environment with Privacy PreservingQuantum fully homomorphic encryption scheme for cloud privacy data based on quantum circuitAnonymous spatial encryption under affine space delegation functionality with full securityBenaloh’s Dense Probabilistic Encryption RevisitedEfficient computation outsourcing for inverting a class of homomorphic functionsIdentity-based quotable ring signaturePredicate signatures from pair encodings via dual system proof techniqueFully secure functional encryption with a large class of relations from the decisional linear assumptionA taxonomy of pairing-friendly elliptic curves(Leveled) Fully Homomorphic Encryption without BootstrappingPerfect Non-interactive Zero Knowledge for NPCompact Group Signatures Without Random OraclesFully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private KeysTowards Robust Computation on Encrypted DataHomomorphic Encryption and Signatures from Vector DecompositionLinearly Homomorphic Encryption from $$\mathsf {DDH}$$Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysisOne-round secure fair meeting location determination based on homomorphic encryptionCiphertext-policy hierarchical attribute-based encryption with short ciphertextsOn Basing Private Information Retrieval on NP-HardnessA CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing systemFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelA new reversible date-hiding algorithm for encrypted imagesDéjà Q: Encore! Un Petit IBESub-linear Size Traceable Ring Signatures without Random OraclesMinimizing the Number of Bootstrappings in Fully Homomorphic EncryptionPrivacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing AttacksSecure Data Aggregation in Wireless Sensor Networks: Homomorphism versus Watermarking ApproachBetter security for deterministic public-key encryption: the auxiliary-input settingApplication of non-associative structures for construction of homomorphic cryptosystemsLeakage-Resilient Functional Encryption via Pair EncodingsSecret Handshakes with Dynamic Expressive Matching PolicyAccountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access StructuresVerifiable single-server private information retrieval from LWE with binary errorsPrivate information retrieval with sublinear online timeAnother Look at Extended Private Information Retrieval ProtocolsSimulatable Adaptive Oblivious Transfer with Statistical Receiver’s PrivacyAnonymous Encryption with Partial-Order Subset Delegation FunctionalityCompact E-Cash and Simulatable VRFs RevisitedProofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of SignaturesEfficient Traceable Signatures in the Standard ModelA novel fully homomorphic encryption scheme bsed on LWEMultiparty cardinality testing for threshold private intersectionA geometric approach to homomorphic secret sharingNon-zero Inner Product Encryption with Short Ciphertexts and Private KeysA Secure M + 1st Price Auction Protocol Based on Bit Slice CircuitsTowards Restricting Plaintext Space in Public Key EncryptionUsing abelian varieties to improve pairing-based cryptographyQuantum Homomorphic Encryption for Polynomial-Sized CircuitsEfficient fully CCA-secure predicate encryptions from pair encodingsEfficient Pairing Computation on Ordinary Elliptic Curves of Embedding Degree 1 and 2Breaking the Circuit Size Barrier for Secure Computation Under DDHNew Techniques for Dual System Encryption and Fully Secure HIBE with Short CiphertextsIdentity-based broadcast encryption with continuous leakage resilienceAn optimized GHV-type HE scheme: simpler, faster, and more versatilePSI-stats: private set intersection protocols supporting secure statistical functionsExplicit formula for optimal ate pairing over cyclotomic family of elliptic curves




This page was built for publication: Theory of Cryptography