International Conference on Theory and Practice of Public Key Cryptography最新文献

筛选
英文 中文
Subversion-Zero-Knowledge SNARKs Subversion-Zero-Knowledge蛇鲨
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2018-03-25 DOI: 10.1007/978-3-319-76578-5_11
G. Fuchsbauer
{"title":"Subversion-Zero-Knowledge SNARKs","authors":"G. Fuchsbauer","doi":"10.1007/978-3-319-76578-5_11","DOIUrl":"https://doi.org/10.1007/978-3-319-76578-5_11","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114045009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 82
Learning with Errors and Extrapolated Dihedral Cosets 误差学习和外推二面体集
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2017-10-23 DOI: 10.1007/978-3-319-76581-5_24
Zvika Brakerski, E. Kirshanova, D. Stehlé, Weiqiang Wen
{"title":"Learning with Errors and Extrapolated Dihedral Cosets","authors":"Zvika Brakerski, E. Kirshanova, D. Stehlé, Weiqiang Wen","doi":"10.1007/978-3-319-76581-5_24","DOIUrl":"https://doi.org/10.1007/978-3-319-76581-5_24","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130932552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Improved Algorithms for the Approximate k-List Problem in Euclidean Norm 欧几里得范数中近似k表问题的改进算法
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2017-03-28 DOI: 10.1007/978-3-662-54365-8_2
Gottfried Herold, E. Kirshanova
{"title":"Improved Algorithms for the Approximate k-List Problem in Euclidean Norm","authors":"Gottfried Herold, E. Kirshanova","doi":"10.1007/978-3-662-54365-8_2","DOIUrl":"https://doi.org/10.1007/978-3-662-54365-8_2","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121068097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Universal Samplers with Fast Verification 通用采样器与快速验证
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2017-03-28 DOI: 10.1007/978-3-662-54388-7_18
Venkata Koppula, Andrew Poelstra, Brent Waters
{"title":"Universal Samplers with Fast Verification","authors":"Venkata Koppula, Andrew Poelstra, Brent Waters","doi":"10.1007/978-3-662-54388-7_18","DOIUrl":"https://doi.org/10.1007/978-3-662-54388-7_18","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126250522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Bit Security of Elliptic Curve Diffie-Hellman 椭圆曲线Diffie-Hellman的位安全性
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2017-03-28 DOI: 10.1007/978-3-662-54365-8_15
Barak Shani
{"title":"On the Bit Security of Elliptic Curve Diffie-Hellman","authors":"Barak Shani","doi":"10.1007/978-3-662-54365-8_15","DOIUrl":"https://doi.org/10.1007/978-3-662-54365-8_15","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126511139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Asymptotically Tight Bounds for Composing ORAM with PIR 组合ORAM与PIR的渐近紧界
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2017-03-28 DOI: 10.1007/978-3-662-54365-8_5
Ittai Abraham, Christopher W. Fletcher, Kartik Nayak, Benny Pinkas, Ling Ren
{"title":"Asymptotically Tight Bounds for Composing ORAM with PIR","authors":"Ittai Abraham, Christopher W. Fletcher, Kartik Nayak, Benny Pinkas, Ling Ren","doi":"10.1007/978-3-662-54365-8_5","DOIUrl":"https://doi.org/10.1007/978-3-662-54365-8_5","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126060079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Circuit-Private Multi-key FHE 电路专用多密钥FHE
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2017-03-28 DOI: 10.1007/978-3-662-54388-7_9
Wutichai Chongchitmate, R. Ostrovsky
{"title":"Circuit-Private Multi-key FHE","authors":"Wutichai Chongchitmate, R. Ostrovsky","doi":"10.1007/978-3-662-54388-7_9","DOIUrl":"https://doi.org/10.1007/978-3-662-54388-7_9","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116411655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Better Two-Round Adaptive Multi-party Computation 更好的两轮自适应多方计算
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2017-03-28 DOI: 10.1007/978-3-662-54388-7_14
R. Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam
{"title":"Better Two-Round Adaptive Multi-party Computation","authors":"R. Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam","doi":"10.1007/978-3-662-54388-7_14","DOIUrl":"https://doi.org/10.1007/978-3-662-54388-7_14","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116804003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts 具有较短可验证密文的保结构选择密文安全性
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2017-03-28 DOI: 10.1007/978-3-662-54365-8_11
Benoît Libert, Thomas Peters, Chen Qian
{"title":"Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts","authors":"Benoît Libert, Thomas Peters, Chen Qian","doi":"10.1007/978-3-662-54365-8_11","DOIUrl":"https://doi.org/10.1007/978-3-662-54365-8_11","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114097385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Fully Leakage-Resilient Codes 完全防泄漏代码
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2017-03-28 DOI: 10.1007/978-3-662-54365-8_14
Antonio Faonio, J. Nielsen
{"title":"Fully Leakage-Resilient Codes","authors":"Antonio Faonio, J. Nielsen","doi":"10.1007/978-3-662-54365-8_14","DOIUrl":"https://doi.org/10.1007/978-3-662-54365-8_14","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"458 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125830237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信