Lightweight Universally Composable Adaptive Oblivious Transfer
暂无分享,去创建一个
[1] Matthew Green,et al. Universally Composable Adaptive Oblivious Transfer , 2008, IACR Cryptol. ePrint Arch..
[2] Siu-Ming Yiu,et al. Acceleration of Composite Order Bilinear Pairing on Graphics Hardware , 2012, ICICS.
[3] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[4] Martijn Stam. Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions , 2008, CRYPTO.
[5] Amit Sahai,et al. Efficient Non-interactive Proof Systems for Bilinear Groups , 2008, EUROCRYPT.
[6] Jan Camenisch,et al. Signature Schemes and Anonymous Credentials from Bilinear Maps , 2004, CRYPTO.
[7] Hovav Shacham,et al. Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings , 2009, Pairing.
[8] Yehuda Lindell,et al. More Efficient Constant-Round Multi-Party Computation from BMR and SHE , 2016, IACR Cryptol. ePrint Arch..
[9] Shai Halevi. Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings , 2009, CRYPTO.
[10] Moni Naor. Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings , 2007, EUROCRYPT.
[11] Matthew Franklin,et al. Advances in Cryptology – CRYPTO 2004 , 2004, Lecture Notes in Computer Science.
[12] Jan Camenisch,et al. Efficient group signature schemes for large groups , 1997 .
[13] Martijn Stam,et al. Understanding Adaptivity: Random Systems Revisited , 2012, ASIACRYPT.
[14] Bart Preneel,et al. Universally Composable Adaptive Priced Oblivious Transfer , 2009, Pairing.
[15] Nigel P. Smart,et al. Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings , 2008, EUROCRYPT.
[16] Yehuda Lindell,et al. Universally composable two-party and multi-party secure computation , 2002, STOC '02.
[17] Jianying Zhou,et al. Information and Communications Security , 2013, Lecture Notes in Computer Science.
[18] Markulf Kohlweiss,et al. P-signatures and Noninteractive Anonymous Credentials , 2008, TCC.
[19] Xingwen Zhao,et al. ID-Based Adaptive Oblivious Transfer , 2009, WISA.
[20] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[21] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[22] Robin Milner,et al. On Observing Nondeterminism and Concurrency , 1980, ICALP.
[23] Dan Boneh,et al. Short Signatures Without Random Oracles , 2004, EUROCRYPT.
[24] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[25] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[26] Amit Sahai,et al. Ring Signatures of Sub-linear Size Without Random Oracles , 2007, ICALP.
[27] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[28] Dan Boneh,et al. Finding composite order ordinary elliptic curves using the Cocks-Pinch method , 2011, IACR Cryptol. ePrint Arch..
[29] Abhi Shelat,et al. Simulatable Adaptive Oblivious Transfer , 2007, EUROCRYPT.
[30] Brent Waters,et al. A Framework for Efficient and Composable Oblivious Transfer , 2008, CRYPTO.
[31] Moni Naor,et al. Oblivious Transfer with Adaptive Queries , 1999, CRYPTO.
[32] Emmanuel Bresson,et al. A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications , 2003, ASIACRYPT.
[33] V. Shoup,et al. Efficient Cryptographic Primitives for Non-Interactive Zero-Knowledge Proofs and Applications , 2011 .
[34] Daniel Wichs,et al. Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer , 2009, IACR Cryptol. ePrint Arch..
[35] Bogdan Warinschi,et al. Advances in Cryptology - Asiacrypt 2008 , 2008 .
[36] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[37] Chi Sung Laih,et al. Advances in Cryptology - ASIACRYPT 2003 , 2003 .
[38] Michael Scott,et al. A Taxonomy of Pairing-Friendly Elliptic Curves , 2010, Journal of Cryptology.
[39] Jan Camenisch,et al. Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.
[40] Jae Hong Seo. On the (Im)possibility of Projecting Property in Prime-Order Setting , 2012, ASIACRYPT.