We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 595 results
  1. Indistinguishability Obfuscation from LPN over \(\mathbb {F}_p\) , DLIN, and PRGs in NC \(^0\)

    In this work, we study what minimal sets of assumptions suffice for constructing indistinguishability obfuscation (...
    Aayush Jain, Huijia Lin, Amit Sahai in Advances in Cryptology – EUROCRYPT 2022
    Conference paper 2022
  2. Compact NIZKs from Standard Assumptions on Bilinear Maps

    A non-interactive zero-knowledge (NIZK) protocol enables a prover to convince a verifier of the truth of a statement without leaking any other...

    Shuichi Katsumata, Ryo Nishimaki, ... Takashi Yamakawa in Journal of Cryptology
    Article 13 May 2024
  3. Improved Reranking Approach for Person Re-identification System

    Safety is ensured in all the public places with the help of surveillance cameras. It can be used to find any person involved in crime or lost person....
    Conference paper 2022
  4. Unbounded Revocable Decentralized Multi-Authority Attribute-Based Encryption Supporting Non-monotone Access Structures

    Ciphertext-policy attribute-based encryption (CP-ABE) is a cryptographic technology that enforces an access control mechanism over encrypted data by...
    Takuya Ishibashi, Toshihiro Ohigashi, Hikaru Tsuchida in Innovative Security Solutions for Information Technology and Communications
    Conference paper 2023
  5. Decentralized Multi-authority ABE for \(\textsf{NC}^1\) from BDH

    Pratish Datta, Ilan Komargodski, Brent Waters in Journal of Cryptology
    Article 24 February 2023
  6. Receiver selective opening security for identity-based encryption in the multi-challenge setting

    Receiver selective opening (RSO) security requires that in a situation where there are one sender and multiple receivers, even if an adversary has...

    Zhengan Huang, Junzuo Lai, ... **n Mu in Designs, Codes and Cryptography
    Article 17 November 2022
  7. Attribute Based Encryption for Deterministic Finite Automata from \(\mathsf{DLIN}\)

    Waters [Crypto, 2012] provided the first attribute based encryption scheme ABE for Deterministic Finite Automata (DFA) from a parametrized or...
    Shweta Agrawal, Monosij Maitra, Shota Yamada in Theory of Cryptography
    Conference paper 2019
  8. Verifiable Private Information Retrieval

    A computational PIR scheme allows a client to privately query a database hosted on a single server without downloading the entire database. We...
    Shany Ben-David, Yael Tauman Kalai, Omer Paneth in Theory of Cryptography
    Conference paper 2022
  9. Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications

    In homomorphic signatures for subset predicates (HSSB), each message (to be signed) is a set. Any signature on a set M allows us to derive a...
    Masahito Ishizaka, Kazuhide Fukushima in Information Security and Privacy
    Conference paper 2023
  10. Attribute-Based Signatures for Range of Inner Product and Its Applications

    In attribute-based signatures (ABS) for inner products, the digital signature analogue of attribute-based encryption for inner products (Katz et al.,...
    Masahito Ishizaka, Kazuhide Fukushima in Information Security and Cryptology – ICISC 2022
    Conference paper 2023
  11. Anonymous attribute-based broadcast encryption with hidden multiple access structures

    Due to the high demands of data communication, the broadcasting system streams the data daily. This service not only sends out the message to the...

    Tran Viet Xuan Phuong in Designs, Codes and Cryptography
    Article Open access 06 April 2024
  12. Syntax Checking Either Way

    We consider parsers of deterministic context-free languages and study the sizes of their syntax checking components. More precisely, we allow the...
    Martin Kutrib, Uwe Meyer in Implementation and Application of Automata
    Conference paper 2022
  13. Compact NIZKs from Standard Assumptions on Bilinear Maps

    A non-interactive zero-knowledge (NIZK) protocol enables a prover to convince a verifier of the truth of a statement without leaking any other...
    Shuichi Katsumata, Ryo Nishimaki, ... Takashi Yamakawa in Advances in Cryptology – EUROCRYPT 2020
    Conference paper 2020
  14. A Simple and Efficient Framework of Proof Systems for NP

    In this work, we propose a simple framework of constructing efficient non-interactive zero-knowledge proof (NIZK) systems for all...
    Yuyu Wang, Chuanjie Su, ... Yu Chen in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  15. Short attribute-based signatures for arbitrary Turing machines from standard assumptions

    This paper presents the first attribute-based signature ( ABS ) scheme supporting signing policies representable by Turing machines ( TM ), based on well-s...

    Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay in Designs, Codes and Cryptography
    Article Open access 17 January 2023
  16. Statistical ZAPR Arguments from Bilinear Maps

    Dwork and Naor (FOCS ’00) defined ZAPs as 2-message witness-indistinguishable proofs that are public-coin. We relax this to ZAPs with private...
    Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs in Advances in Cryptology – EUROCRYPT 2020
    Conference paper 2020
  17. Key-Range Attribute-Based Signatures for Range of Inner Product and Its Applications

    In attribute-based signatures (ABS) for range of inner product (ARIP), recently proposed by Ishizaka and Fukushima at ICISC 2022, a secret-key...
    Masahito Ishizaka in Provable and Practical Security
    Conference paper 2023
  18. Efficient Designated-Server Proxy Re-encryption with Keyword Search for Big Data

    Against the background of the era of big data and cloud computing, cloud platforms have become the first choice for data storage. While cloud...
    Miaolei Deng, Wenshuai Song, ... Muhammad Israr in Advances in Artificial Intelligence and Security
    Conference paper 2022
  19. Verifiable and Boolean keyword searchable attribute-based signcryption for electronic medical record storage and retrieval in cloud computing environment

    Cloud-based electronic medical record (EMR) management system is an emerging paradigm that enables EMR owners to store and share their EMRs with...

    Sourav Bera, Suryakant Prasad, Y. Sreenivasa Rao in The Journal of Supercomputing
    Article 13 June 2023
  20. Verifiable Inner Product Encryption Scheme

    In the standard setting of functional encryption (FE), we assume both the Central Authority (CA) and the encryptors to run their respective...
    Najmeh Soroush, Vincenzo Iovino, ... Peter Y. A. Ryan in Public-Key Cryptography – PKC 2020
    Conference paper 2020
Did you find what you were looking for? Share feedback.