New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators
暂无分享,去创建一个
Brent Waters | Tatsuaki Okamoto | Daniel Wichs | Krzysztof Pietrzak | Krzysztof Pietrzak | T. Okamoto | Brent Waters | Daniel Wichs | D. Wichs
[1] Yael Tauman Kalai,et al. Leaky Pseudo-Entropy Functions , 2011, ICS.
[2] Josh Benaloh,et al. One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract) , 1994, EUROCRYPT.
[3] Kai-Min Chung,et al. Computation-Trace Indistinguishability Obfuscation and its Applications , 2015, IACR Cryptol. ePrint Arch..
[4] Allison Bishop,et al. Indistinguishability Obfuscation for Turing Machines with Unbounded Memory , 2015, IACR Cryptol. ePrint Arch..
[5] Brent Waters,et al. Lossy Trapdoor Functions and Their Applications , 2011, SIAM J. Comput..
[6] Mark Zhandry,et al. Adaptively Secure Broadcast Encryption with Small System Parameters , 2014, IACR Cryptol. ePrint Arch..
[7] Daniel Wichs,et al. On the Communication Complexity of Secure Function Evaluation with Long Output , 2015, IACR Cryptol. ePrint Arch..
[8] Moni Naor,et al. Public-Key Cryptosystems Resilient to Key Leakage , 2009, SIAM J. Comput..
[9] Adam O'Neill,et al. Instantiability of RSA-OAEP Under Chosen-Plaintext Attack , 2010, Journal of Cryptology.
[10] Silvio Micali,et al. Computationally Private Information Retrieval with Polylogarithmic Communication , 1999, EUROCRYPT.
[11] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[12] Helger Lipmaa,et al. An Oblivious Transfer Protocol with Log-Squared Communication , 2005, ISC.
[13] Brent Waters,et al. Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.
[14] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[15] Ran Canetti,et al. Fully Succinct Garbled RAM , 2016, ITCS.
[16] Brent Waters,et al. How to use indistinguishability obfuscation: deniable encryption, and more , 2014, IACR Cryptol. ePrint Arch..
[17] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.