![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
123 Result(s)
-
Article
Threshold privacy-preserving cloud auditing with multiple uploaders
Data integrity is a critical security issue in cloud storage. The data integrity checking schemes by a third-party auditor (TPA) have attracted a lot of attention. Sharing data among multiple users (uploaders)...
-
Article
Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes
Attribute-based encryption (ABE) allows one-to-many encryption with static access control. In many occasions, the access control policy must be updated, but the original encryptor might be unavailable to re-en...
-
Article
Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts
Ciphertext-policy attribute-based encryption (CP-ABE) is a very promising cryptographic primitive that allows a data owner to encrypt messages and manage access policies themselves. Most of the existing CP-ABE...
-
Article
Efficient identity-based online/offline encryption and signcryption with short ciphertext
The technique of online/offline is regarded as a promising approach to speed up the computation of encryption, because the most part of computation, such as pairing over points on elliptic curve and exponentia...
-
Chapter and Conference Paper
ID-Based Encryption with Equality Test Against Insider Attack
Testing if two ciphertexts contain the same plaintext is an interesting cryptographic primitive. It is usually referred to as equality test of encrypted data or equality test. One of attractive applications of...
-
Chapter and Conference Paper
Privacy-Preserving k-time Authenticated Secret Handshakes
Secret handshake allows a group of authorized users to establish a shared secret key and at the same time authenticate each other anonymously. A straightforward approach to design an unlinkable secret handshak...
-
Chapter and Conference Paper
Provably Secure Homomorphic Signcryption
Signcryption has shown many useful applications, in particular for the environment where the computation and communication resources are constrained, for instance, for applications on lightweight devices. Howe...
-
Chapter and Conference Paper
Hierarchical Functional Encryption for Linear Transformations
In contrast to the conventional all-or-nothing encryption, functional encryption (FE) allows partial revelation of encrypted information based on the keys associated with different functionalities. Extending F...
-
Chapter and Conference Paper
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample
Optimal security reductions for unique signatures (Coron, Eurocrypt 2002) and their generalization, i.e., efficiently re-randomizable signatures (Hofheinz et al. PKC 2012 & Bader et al. Eurocrypt 2016) have been ...
-
Chapter and Conference Paper
Mergeable and Revocable Identity-Based Encryption
Identity-based encryption (IBE) has been extensively studied and widely used in various applications since Boneh and Franklin proposed the first practical scheme based on pairing. In that seminal work, it has ...
-
Chapter and Conference Paper
Deniable Ring Authentication Based on Projective Hash Functions
Deniable authentication allows the participants to deny an authentication process as there is no any evidence that it ever took place. It is quite suitable for the privacy-preserving scenario. Combining with t...
-
Article
Message from the Guest Editors
-
Chapter and Conference Paper
One-Round Strong Oblivious Signature-Based Envelope
Oblivious Signature-Based Envelope (OSBE) has been widely employed for anonymity-orient and privacy-preserving applications. The conventional OSBE execution relies on a secure communication channel to protect ...
-
Chapter and Conference Paper
One-Round Attribute-Based Key Exchange in the Multi-party Setting
Attribute-based authenticated key exchange (AB-AKE) is a useful primitive that allows a group of users to establish a shared secret key and at the same time enables fine-grained access control. A straightforwa...
-
Chapter and Conference Paper
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction
The indistinguishability security of a public-key cryptosystem can be reduced to a computational hard assumption in the random oracle model, where the solution to a computational hard problem is hidden in one ...
-
Chapter and Conference Paper
Public Key Encryption with Authorized Keyword Search
Public key encryption with keyword search (PEKS) provides an elegant mechanism for a user to identify the specific encrypted data. PEKS protects data against disclosure while making it searchable. In this pape...
-
Chapter and Conference Paper
A Privacy Preserving Source Verifiable Encryption Scheme
It is critical to guarantee message confidentiality and user privacy in communication networks, especially for group communications. We find previous works seldom consider these aspects at the same time and so...
-
Chapter and Conference Paper
Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance
Attribute-based encryption (ABE) is a promising cryptographic primitive that allows one-to-many encryption. In such a system, users’ private keys are linked to their access rights. We note that if a user can g...
-
Chapter and Conference Paper
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions
Motivated by the revelations of Edward Snowden, post-Snowden cryptography has become a prominent research direction in recent years. In Eurocrypt 2015, Mironov and Stephens-Davidowitz proposed a novel concept ...
-
Chapter and Conference Paper
Proxy Signature with Revocation
Proxy signature is a useful cryptographic primitive that allows signing right delegation. In a proxy signature scheme, an original signer can delegate his/her signing right to a proxy signer (or a group of pro...