Sciweavers

TCC
2010
Springer
381views Cryptology» more  TCC 2010»
14 years 2 months ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters
TCC
2010
Springer
324views Cryptology» more  TCC 2010»
14 years 2 months ago
Leakage-Resilient Signatures
The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. In practice, however, this notion can be insuļ¬ƒcient due to ā€...
Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, G...
TCC
2010
Springer
303views Cryptology» more  TCC 2010»
14 years 2 months ago
Efficient Rational Secret Sharing in Standard Communication Networks
Georg Fuchsbauer, Jonathan Katz, David Naccache
TCC
2010
Springer
236views Cryptology» more  TCC 2010»
14 years 2 months ago
From Passive to Covert Security at Low Cost
Aumann and Lindell deļ¬ned security against covert attacks, where the adversary is malicious, but is only caught cheating with a certain probability, where the idea is that in man...
Ivan Damgård, Martin Geisler, Jesper Buus Ni...
TCC
2010
Springer
231views Cryptology» more  TCC 2010»
14 years 2 months ago
A Domain Extender for the Ideal Cipher
We describe the ļ¬rst domain extender for ideal ciphers, i.e. we show a construction that is indiļ¬€erentiable from a 2n-bit ideal cipher, given a n-bit ideal cipher. Our construc...
Jean-Sébastien Coron, Yevgeniy Dodis, Avrad...
Cryptology
Top of PageReset Settings