Sciweavers

1064 search results - page 14 / 213
» Cryptography from Anonymity
Sort
View
ASIACRYPT
2011
Springer
14 years 1 months ago
Leakage-Resilient Cryptography from the Inner-Product Extractor
We present a generic method to secure various widely-used cryptosystems against arbitrary side-channel leakage, as long as the leakage adheres three restrictions: first, it is bou...
Stefan Dziembowski, Sebastian Faust
114
Voted
STOC
2010
ACM
226views Algorithms» more  STOC 2010»
15 years 11 months ago
Public-Key Cryptography from Different Assumptions
We construct a new public key encryption based on two assumptions:
Benny Applebaum, Boaz Barak and Avi Wigderson
ASM
2008
ASM
15 years 3 months ago
From ABZ to Cryptography
Eerke A. Boiten
132
Voted
PKC
2012
Springer
212views Cryptology» more  PKC 2012»
13 years 4 months ago
Public-Key Cryptography from New Multivariate Quadratic Assumptions
In this work, we study a new multivariate quadratic (MQ) assumption that can be used to construct public-key encryption schemes. In particular, we research in the following two di...
Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang
SP
2007
IEEE
120views Security Privacy» more  SP 2007»
15 years 8 months ago
Endorsed E-Cash
An electronic cash (e-cash) scheme lets a user withdraw money from a bank and then spend it anonymously. E-cash can be used only if it can be securely and fairly exchanged for ele...
Jan Camenisch, Anna Lysyanskaya, Mira Meyerovich