International Conference on Theory and Practice of Public Key Cryptography最新文献

筛选
英文 中文
Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-malleable Codes 弹性泄漏、局部可解码和可更新非延展性码的紧上下界
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2017-03-28 DOI: 10.1007/978-3-662-54365-8_13
D. Dachman-Soled, Mukul Kulkarni, Aria Shahverdi
{"title":"Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-malleable Codes","authors":"D. Dachman-Soled, Mukul Kulkarni, Aria Shahverdi","doi":"10.1007/978-3-662-54365-8_13","DOIUrl":"https://doi.org/10.1007/978-3-662-54365-8_13","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132177596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Tightly Secure IBE Under Constant-Size Master Public Key 在恒定大小的主公钥下严密保护IBE
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2017-03-28 DOI: 10.1007/978-3-662-54365-8_9
Jie Chen, Junqing Gong, J. Weng
{"title":"Tightly Secure IBE Under Constant-Size Master Public Key","authors":"Jie Chen, Junqing Gong, J. Weng","doi":"10.1007/978-3-662-54365-8_9","DOIUrl":"https://doi.org/10.1007/978-3-662-54365-8_9","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114988239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Non-malleable Codes with Split-State Refresh 具有分裂状态刷新的不可延展性代码
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2017-03-28 DOI: 10.1007/978-3-662-54365-8_12
Antonio Faonio, J. Nielsen
{"title":"Non-malleable Codes with Split-State Refresh","authors":"Antonio Faonio, J. Nielsen","doi":"10.1007/978-3-662-54365-8_12","DOIUrl":"https://doi.org/10.1007/978-3-662-54365-8_12","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129343191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Provably Secure NTRU Instances over Prime Cyclotomic Rings 素数环上可证明安全的NTRU实例
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2017-03-28 DOI: 10.1007/978-3-662-54365-8_17
Yang Yu, Guangwu Xu, Xiaoyun Wang
{"title":"Provably Secure NTRU Instances over Prime Cyclotomic Rings","authors":"Yang Yu, Guangwu Xu, Xiaoyun Wang","doi":"10.1007/978-3-662-54365-8_17","DOIUrl":"https://doi.org/10.1007/978-3-662-54365-8_17","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131177542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Nearly Optimal Verifiable Data Streaming 近最优可验证数据流
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2016-03-06 DOI: 10.1007/978-3-662-49384-7_16
Johannes Krupp, Dominique Schröder, Mark Simkin, D. Fiore, G. Ateniese, S. Nürnberger
{"title":"Nearly Optimal Verifiable Data Streaming","authors":"Johannes Krupp, Dominique Schröder, Mark Simkin, D. Fiore, G. Ateniese, S. Nürnberger","doi":"10.1007/978-3-662-49384-7_16","DOIUrl":"https://doi.org/10.1007/978-3-662-49384-7_16","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120847462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions Fujisaki-Okamoto结构的密钥依赖信息安全性研究
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2016-03-06 DOI: 10.1007/978-3-662-49384-7_5
Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
{"title":"On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions","authors":"Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka","doi":"10.1007/978-3-662-49384-7_5","DOIUrl":"https://doi.org/10.1007/978-3-662-49384-7_5","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123377139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
CCA-Secure Keyed-Fully Homomorphic Encryption 安全密钥-全同态加密
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2016-03-06 DOI: 10.1007/978-3-662-49384-7_4
Junzuo Lai, R. Deng, Changshe Ma, K. Sakurai, J. Weng
{"title":"CCA-Secure Keyed-Fully Homomorphic Encryption","authors":"Junzuo Lai, R. Deng, Changshe Ma, K. Sakurai, J. Weng","doi":"10.1007/978-3-662-49384-7_4","DOIUrl":"https://doi.org/10.1007/978-3-662-49384-7_4","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129167148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Algebraic Approaches for the Elliptic Curve Discrete Logarithm Problem over Prime Fields 素数域上椭圆曲线离散对数问题的代数方法
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2016-03-06 DOI: 10.1007/978-3-662-49387-8_1
C. Petit, M. Kosters, Ange Messeng
{"title":"Algebraic Approaches for the Elliptic Curve Discrete Logarithm Problem over Prime Fields","authors":"C. Petit, M. Kosters, Ange Messeng","doi":"10.1007/978-3-662-49387-8_1","DOIUrl":"https://doi.org/10.1007/978-3-662-49387-8_1","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129608220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Chosen-Ciphertext Security from Subset Sum 从子集和选择密文安全性
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2016-03-06 DOI: 10.1007/978-3-662-49384-7_2
Sebastian Faust, Daniel Masny, D. Venturi
{"title":"Chosen-Ciphertext Security from Subset Sum","authors":"Sebastian Faust, Daniel Masny, D. Venturi","doi":"10.1007/978-3-662-49384-7_2","DOIUrl":"https://doi.org/10.1007/978-3-662-49384-7_2","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"40 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131692254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Identity-Based Cryptosystems and Quadratic Residuosity 基于身份的密码系统与二次残差
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2016-03-06 DOI: 10.1007/978-3-662-49384-7_9
M. Joye
{"title":"Identity-Based Cryptosystems and Quadratic Residuosity","authors":"M. Joye","doi":"10.1007/978-3-662-49384-7_9","DOIUrl":"https://doi.org/10.1007/978-3-662-49384-7_9","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114778395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信