Sciweavers

29 search results - page 1 / 6
» asiacrypt 2008
Sort
View
ASIACRYPT
2008
Springer
13 years 6 months ago
Hash Functions from Sigma Protocols and Improvements to VSH
Mihir Bellare, Todor Ristov
ASIACRYPT
2008
Springer
13 years 6 months ago
On the Security of HB# against a Man-in-the-Middle Attack
Khaled Ouafi, Raphael Overbeck, Serge Vaudenay
ASIACRYPT
2008
Springer
13 years 6 months ago
Efficient Protocols for Set Membership and Range Proofs
Jan Camenisch, Rafik Chaabouni, Abhi Shelat
ASIACRYPT
2008
Springer
13 years 6 months ago
Generalized Identity Based and Broadcast Encryption Schemes
Abstract. We provide a general framework for constructing identitybased and broadcast encryption systems. In particular, we construct a general encryption system called spatial enc...
Dan Boneh, Michael Hamburg
ASIACRYPT
2008
Springer
13 years 6 months ago
Towards Robust Computation on Encrypted Data
Encryption schemes that support computation on encrypted data are useful in constructing efficient and intuitively simple cryptographic protocols. However, the approach was previo...
Manoj Prabhakaran, Mike Rosulek