Skip to main content

and
Your search also matched 17 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Half-Aggregation of Schnorr Signatures with Tight Reductions

Include preview-only content
  1. Chapter and Conference Paper

    Generic and Practical Key Establishment from Lattice

    In this work, we abstract some key ingredients in previous key establishment and public-key encryption schemes from LWE and its variants. Specifically, we explicitly formalize the building tool, referred to as...

    Zhengzhong **, Yunlei Zhao in Applied Cryptography and Network Security (2019)

  2. Chapter and Conference Paper

    Order-Revealing Encryption: File-Injection Attack and Forward Security

    Order-preserving encryption (OPE) and order-revealing encryption (ORE) are among the core ingredients for encrypted databases (EDBs). In this work, we study the leakage of OPE and ORE and their forward security.

    **ngchen Wang, Yunlei Zhao in Computer Security (2018)

  3. Chapter and Conference Paper

    Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack

    Security against selective opening attack (SOA) requires that in a multi-user setting, even if an adversary has access to all ciphertexts from users, and adaptively corrupts some fraction of the users by expos...

    Junzuo Lai, Robert H. Deng, Shengli Liu in Advances in Cryptology – EUROCRYPT 2014 (2014)

  4. Chapter and Conference Paper

    All-but-One Dual Projective Hashing and Its Applications

    Recently, Wee (EUROCRYPT’12) introduced the notion of dual projective hashing as an extension of the Cramer-Shoup projective hashing, with a simple construction of lossy trapdoor functions, and a simple constr...

    Zongyang Zhang, Yu Chen, Sherman S. M. Chow in Applied Cryptography and Network Security (2014)

  5. Chapter and Conference Paper

    A New Framework for Privacy of RFID Path Authentication

    RFID-based path authentication enables supply chain managers to verify the exact path that a tag has taken. In this paper, we introduce a new oracle Move that models a tag’s movement along a designed or an arbitr...

    Shaoying Cai, Robert H. Deng, Yingjiu Li in Applied Cryptography and Network Security (2012)

  6. Chapter and Conference Paper

    On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010

    In ACM CCS 2007, Canetti and Hohenberger left an interesting open problem of how to construct a chosen-ciphertext secure proxy re-encryption (PRE) scheme without bilinear maps. This is a rather interesting pro...

    Jian Weng, Yunlei Zhao, Goichiro Hanaoka in Public Key Cryptography – PKC 2011 (2011)

  7. Chapter and Conference Paper

    Hierarchical Identity-Based Chameleon Hash and Its Applications

    At ACNS 2008, Canard et al. introduced the notion of trapdoor sanitizable signature (TSS) based on identity-based chameleon hash (IBCH). Trapdoor sanitizable signatures allow the signer of a message to delegat...

    Feng Bao, Robert H. Deng, Xuhua Ding in Applied Cryptography and Network Security (2011)

  8. Chapter and Conference Paper

    Deniable Internet Key Exchange

    In this work, we develop a family of non-malleable and deniable Diffie-Hellman key-exchange (DHKE) protocols, named deniable Internet key-exchange (DIKE). The newly developed DIKE protocols are of conceptual clar...

    Andrew C. Yao, Yunlei Zhao in Applied Cryptography and Network Security (2010)

  9. Chapter and Conference Paper

    Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model

    We present a generic construction for constant-round concurrsound resettable zero-knowledge (rZK-CS) arguments for \(\mathcal{NP}\) ...

    Moti Yung, Yunlei Zhao in Advances in Cryptology - EUROCRYPT 2007 (2007)