Sciweavers

CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
13 years 5 months ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
CRYPTO
2010
Springer
110views Cryptology» more  CRYPTO 2010»
13 years 5 months ago
An Efficient and Parallel Gaussian Sampler for Lattices
At the heart of many recent lattice-based cryptographic schemes is a polynomial-time algorithm that, given a `high-quality' basis, generates a lattice point according to a Ga...
Chris Peikert
CRYPTO
2010
Springer
208views Cryptology» more  CRYPTO 2010»
13 years 5 months ago
Improved Delegation of Computation Using Fully Homomorphic Encryption
Following Gennaro, Gentry, and Parno (Cryptology ePrint Archive 2009/547), we use fully homomorphic encryption to design improved schemes for delegating computation. In such schem...
Kai-Min Chung, Yael Kalai, Salil P. Vadhan
CRYPTO
2010
Springer
109views Cryptology» more  CRYPTO 2010»
13 years 5 months ago
Equivalence of Uniform Key Agreement and Composition Insecurity
Chongwon Cho, Chen-Kuei Lee, Rafail Ostrovsky
CRYPTO
2010
Springer
197views Cryptology» more  CRYPTO 2010»
13 years 5 months ago
Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
We present a technique for delegating a short lattice basis that has the advantage of keeping the lattice dimension unchanged upon delegation. Building on this result, we construct...
Shweta Agrawal, Dan Boneh, Xavier Boyen
CRYPTO
2010
Springer
158views Cryptology» more  CRYPTO 2010»
13 years 5 months ago
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography
Motivated by the question of basing cryptographic protocols on stateless tamper-proof hardware tokens, we revisit the question of unconditional two-prover zero-knowledge proofs fo...
Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit ...
CRYPTO
2010
Springer
139views Cryptology» more  CRYPTO 2010»
13 years 5 months ago
Concurrent Non-Malleable Zero Knowledge Proofs
Huijia Lin, Rafael Pass, Wei-Lung Dustin Tseng, Mu...
CRYPTO
2010
Springer
195views Cryptology» more  CRYPTO 2010»
13 years 5 months ago
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
This paper presents a fully secure functional encryption scheme for a wide class of relations, that are specified by non-monotone access structures combined with inner-product rel...
Tatsuaki Okamoto, Katsuyuki Takashima
CRYPTO
2010
Springer
151views Cryptology» more  CRYPTO 2010»
13 years 5 months ago
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
Abstract. A cryptographic primitive is leakage-resilient, if it remains secure even if an adversary can learn a bounded amount of arbitrary information about the computation with e...
Yevgeniy Dodis, Krzysztof Pietrzak