{"title":"Making Sigma-Protocols Non-interactive Without Random Oracles","authors":"Pyrros Chaidos, Jens Groth","doi":"10.1007/978-3-662-46447-2_29","DOIUrl":"https://doi.org/10.1007/978-3-662-46447-2_29","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125562517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collision of Random Walks and a Refined Analysis of Attacks on the Discrete Logarithm Problem","authors":"S. Kijima, R. Montenegro","doi":"10.1007/978-3-662-46447-2_6","DOIUrl":"https://doi.org/10.1007/978-3-662-46447-2_6","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130868049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Foteini Baldimtsi, Melissa Chase, G. Fuchsbauer, Markulf Kohlweiss
{"title":"Anonymous Transferable E-Cash","authors":"Foteini Baldimtsi, Melissa Chase, G. Fuchsbauer, Markulf Kohlweiss","doi":"10.1007/978-3-662-46447-2_5","DOIUrl":"https://doi.org/10.1007/978-3-662-46447-2_5","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131136245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shashank Agrawal, Shweta Agrawal, S. Badrinarayanan, Abishek Kumarasubramanian, M. Prabhakaran, A. Sahai
{"title":"On the Practical Security of Inner Product Functional Encryption","authors":"Shashank Agrawal, Shweta Agrawal, S. Badrinarayanan, Abishek Kumarasubramanian, M. Prabhakaran, A. Sahai","doi":"10.1007/978-3-662-46447-2_35","DOIUrl":"https://doi.org/10.1007/978-3-662-46447-2_35","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130680510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions","authors":"Jacob Alperin-Sheriff","doi":"10.1007/978-3-662-46447-2_11","DOIUrl":"https://doi.org/10.1007/978-3-662-46447-2_11","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116865705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case","authors":"M. Pena, J. Faugère, Ludovic Perret","doi":"10.1007/978-3-662-46447-2_9","DOIUrl":"https://doi.org/10.1007/978-3-662-46447-2_9","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132321693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicate Encryption for Multi-dimensional Range Queries from Lattices","authors":"Romain Gay, Pierrick Méaux, H. Wee","doi":"10.1007/978-3-662-46447-2_34","DOIUrl":"https://doi.org/10.1007/978-3-662-46447-2_34","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116245149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Faster ECC over mathbb F_2^521-1","authors":"R. Granger, M. Scott","doi":"10.1007/978-3-662-46447-2_24","DOIUrl":"https://doi.org/10.1007/978-3-662-46447-2_24","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126737250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Faugère, D. Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae
{"title":"A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems","authors":"J. Faugère, D. Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae","doi":"10.1007/978-3-662-46447-2_7","DOIUrl":"https://doi.org/10.1007/978-3-662-46447-2_7","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130945252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Selective Opening Security of Practical Public-Key Encryption Schemes","authors":"F. Heuer, Tibor Jager, Eike Kiltz, Sven Schäge","doi":"10.1007/978-3-662-46447-2_2","DOIUrl":"https://doi.org/10.1007/978-3-662-46447-2_2","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115265410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}