Search

Your search keyword '"random oracle model"' showing total 1,304 results

Search Constraints

Start Over You searched for: Descriptor "random oracle model" Remove constraint Descriptor: "random oracle model"
1,304 results on '"random oracle model"'

Search Results

301. Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications

302. Vector Commitments and Their Applications

303. Decentralized Attribute-Based Signatures

304. Short Pairing-Efficient Threshold-Attribute-Based Signature

305. A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption

306. EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity

307. Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition

311. Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random Oracle Model

312. Fast and Private Computation of Cardinality of Set Intersection and Union

313. Dual Form Signatures: An Approach for Proving Security from Static Assumptions

314. How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios

315. On the Non-malleability of the Fiat-Shamir Transform

316. A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening

317. Certificate-Based Key-Insulated Signature

318. (Strong) Multi-Designated Verifiers Signatures Secure against Rogue Key Attack

319. Compact Stateful Encryption Schemes with Ciphertext Verifiability

320. Efficient Two-Move Blind Signatures in the Common Reference String Model

321. Domain-Specific Pseudonymous Signatures for the German Identity Card

322. Revisiting Difficulty Notions for Client Puzzles and DoS Resilience

323. Perfect Keyword Privacy in PEKS Systems

324. Deterministic Random Oracles

325. Applying Divertibility to Blind Ballot Copying in the Helios Internet Voting System

326. The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security

327. CommitCoin: Carbon Dating Commitments with Bitcoin : (Short Paper)

328. Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol

329. Indifferentiability of Domain Extension Modes for Hash Functions

330. Short and Efficient Identity-Based Undeniable Signature Scheme

331. A New Approach to Practical Active-Secure Two-Party Computation

332. Sufficient Condition for Identity-Based Authenticated Key Exchange Resilient to Leakage of Secret Keys

333. Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts

334. Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures

335. Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange

336. Size-Hiding in Private Set Intersection: Existential Results and Constructions

337. Experimenting with Fast Private Set Intersection

338. Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies

339. Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes

340. Computationally-Fair Group and Identity-Based Key-Exchange

341. Incremental Deterministic Public-Key Encryption

342. Lattice Signatures without Trapdoors

343. Optimal Security Proofs for Full Domain Hash, Revisited

344. Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers

345. On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model

346. Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources

347. A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy

348. Secure Two-Party Computation with Low Communication

349. Deniable RSA Signature : The Raise and Fall of Ali Baba

350. Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping

Catalog

Books, media, physical & digital resources