Sciweavers

332 search results - page 19 / 67
» Token-Controlled Public Key Encryption
Sort
View
CSFW
2008
IEEE
15 years 11 months ago
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
Composition theorems in simulation-based approaches allow to build complex protocols from sub-protocols in a modular way. However, as first pointed out and studied by Canetti and ...
Ralf Küsters, Max Tuengerthal
126
Voted
SCN
2008
Springer
116views Communications» more  SCN 2008»
15 years 4 months ago
General Certificateless Encryption and Timed-Release Encryption
While recent timed-release encryption (TRE) schemes are implicitly supported by a certificateless encryption (CLE) mechanism, the security models of CLE and TRE differ and there is...
Sherman S. M. Chow, Volker Roth, Eleanor G. Rieffe...
136
Voted
TCC
2010
Springer
166views Cryptology» more  TCC 2010»
16 years 1 months ago
Public-Key Encryption Schemes with Auxiliary Inputs
We construct public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one t...
Yevgeniy Dodis, Shafi Goldwasser, Yael Tauman Kala...
134
Voted
ASIACRYPT
2009
Springer
15 years 11 months ago
Efficient Public Key Encryption Based on Ideal Lattices
Damien Stehlé, Ron Steinfeld, Keisuke Tanak...
119
Voted
CRYPTO
2007
Springer
86views Cryptology» more  CRYPTO 2007»
15 years 11 months ago
Public Key Encryption That Allows PIR Queries
Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, Wil...