We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 595 results
  1. Compact Structure-Preserving Signatures with Almost Tight Security

    In structure-preserving cryptography, every building block shares the same bilinear groups. These groups must be generated for a specific, a priori...

    Masayuki Abe, Dennis Hofheinz, ... Jiaxin Pan in Journal of Cryptology
    Article Open access 10 August 2023
  2. Cryptanalysis of the CLT13 Multilinear Map

    In this paper, we describe a polynomial time cryptanalysis of the (approximate) multilinear map proposed by Coron, Lepoint, and Tibouchi in Crypto13...

    Jung Hee Cheon, Kyoohyung Han, ... Damien Stehlé in Journal of Cryptology
    Article Open access 06 December 2018
  3. Anonymous Permutation Routing

    The Non-Interactive Anonymous Router (NIAR) model was introduced by Shi and Wu [SW21] as an alternative to conventional solutions to the anonymous...
    Paul Bunn, Eyal Kushilevitz, Rafail Ostrovsky in Theory of Cryptography
    Conference paper 2023
  4. On the Impossibility of Algebraic NIZK in Pairing-Free Groups

    Non-Interactive Zero-Knowledge proofs (NIZK) allow a prover to convince a verifier that a statement is true by sending only one message and without...
    Conference paper 2023
  5. Towards Accountability in CRS Generation

    It is well known that several cryptographic primitives cannot be achieved without a common reference string (CRS). Those include, for instance,...
    Prabhanjan Ananth, Gilad Asharov, ... Vipul Goyal in Advances in Cryptology – EUROCRYPT 2021
    Conference paper 2021
  6. Generic constructions of master-key KDM secure attribute-based encryption

    Master-key key-dependent message (mKDM) security is a strong security notion for attribute-based encryption (ABE) schemes, which has been...

    Jiaxin Pan, Chen Qian, Benedikt Wagner in Designs, Codes and Cryptography
    Article 09 September 2023
  7. CP-ABE for Circuits (and More) in the Symmetric Key Setting

    The celebrated work of Gorbunov, Vaikuntanathan and Wee [GVW13] provided the first key policy attribute based encryption scheme (ABE) for circuits...
    Shweta Agrawal, Shota Yamada in Theory of Cryptography
    Conference paper 2020
  8. On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption

    Homomorphic encryption (HE) is public key encryption that enables computation over ciphertexts without decrypting them, while it is known that HE...
    Hirotomo Shinoki, Koji Nuida in Advances in Information and Computer Security
    Conference paper 2022
  9. Compact Designated Verifier NIZKs from the CDH Assumption Without Pairings

    In a non-interactive zero-knowledge (NIZK) proof, a prover can non-interactively convince a verifier of a statement without revealing any additional...

    Shuichi Katsumata, Ryo Nishimaki, ... Takashi Yamakawa in Journal of Cryptology
    Article 18 September 2021
  10. Shorter Non-interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages

    We put forth a new framework for building pairing-based non-interactive zero-knowledge (...
    Geoffroy Couteau, Dominik Hartmann in Advances in Cryptology – CRYPTO 2020
    Conference paper 2020
  11. A Survey on Automata with Translucent Letters

    In this survey we present the various types of automata with translucent letters that have been studied in the literature. These include the finite...
    Conference paper 2023
  12. Leakage-Resilient Key Exchange and Two-Seed Extractors

    Can Alice and Bob agree on a uniformly random secret key without having any truly secret randomness to begin with? Here we consider a setting where...
    **n Li, Fermi Ma, ... Daniel Wichs in Advances in Cryptology – CRYPTO 2020
    Conference paper 2020
  13. Decentralized Multi-authority Anonymous Credential System with Bundled Languages on Identifiers

    We propose an anonymous credential system equipped with independent decentralized authorities who issue credentials. In our system, the number of...
    Conference paper 2021
  14. Function-Revealing Encryption

    Multi-input functional encryption is a paradigm that allows an authorized user to compute a certain function—and nothing more—over multiple...
    Marc Joye, Alain Passelègue in Security and Cryptography for Networks
    Conference paper 2018
  15. An Efficient Dynamic Group Signatures Scheme with CCA-Anonymity in Standard Model

    Group signatures is a cryptographic primitive, simultaneously supporting anonymity and traceability. Though many group signatures schemes have been...
    **aohan Yue, Mingju Sun, ... Yuan He in Cyberspace Safety and Security
    Conference paper 2019
  16. Expected Constant Round Byzantine Broadcast Under Dishonest Majority

    Byzantine Broadcast (BB) is a central question in distributed systems, and an important challenge is to understand its round complexity. Under the...
    Jun Wan, Hanshen **ao, ... Srinivas Devadas in Theory of Cryptography
    Conference paper 2020
  17. Broadcast, Trace and Revoke with Optimal Parameters from Polynomial Hardness

    A broadcast, trace and revoke system generalizes broadcast encryption as well as traitor tracing. In such a scheme, an encryptor can specify a list...
    Shweta Agrawal, Simran Kumari, ... Shota Yamada in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  18. Verifiable Random Functions from Non-interactive Witness-Indistinguishable Proofs

    Verifiable random functions (VRFs) are pseudorandom functions where the owner of the seed, in addition to computing the function’s value y at any...

    Nir Bitansky in Journal of Cryptology
    Article 04 September 2019
  19. New Assumptions on Isogenous Pairing Groups with Applications to Attribute-Based Encryption

    We introduce new isogeny-related assumptions called Isog-DDH and Isog-DBDH assumptions. By using the assumptions, we reinforce security of several...
    Takeshi Koshiba, Katsuyuki Takashima in Information Security and Cryptology – ICISC 2018
    Conference paper 2019
  20. Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search

    Certificateless Public-key Authenticated Encryption with Keyword Search (CLPAEKS) is derived from the Public-key Authenticated Encryption with...
    Xueqiao Liu, Hongbo Li, ... Qiong Huang in Provable Security
    Conference paper 2019
Did you find what you were looking for? Share feedback.