Witness encryption and its applications
暂无分享,去创建一个
Brent Waters | Craig Gentry | Amit Sahai | Sanjam Garg | A. Sahai | Brent Waters | Craig Gentry | Sanjam Garg
[1] Iordanis Kerenidis,et al. Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model , 2008, TCC.
[2] Ronald Cramer,et al. Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption , 2001, EUROCRYPT.
[3] Toshiya Itoh,et al. A language-dependent cryptographic primitive , 1997, Journal of Cryptology.
[4] Srinivasan Venkatesh,et al. A Characterization of Non-interactive Instance-Dependent Commitment-Schemes (NIC) , 2007, ICALP.
[5] Mihir Bellare,et al. Adaptive Witness Encryption and Asymmetric Password-Based Cryptography , 2015, Public Key Cryptography.
[6] Joseph H. Silverman,et al. NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.
[7] Toshiaki Tanaka,et al. On the Existence of 3-Round Zero-Knowledge Protocols , 1998, CRYPTO.
[8] Salil P. Vadhan,et al. An Equivalence Between Zero Knowledge and Commitments , 2008, TCC.
[9] Rafail Ostrovsky,et al. Perfect Non-Interactive Zero Knowledge for NP , 2006, IACR Cryptol. ePrint Arch..
[10] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[11] Dan Boneh,et al. Applications of Multilinear Forms to Cryptography , 2002, IACR Cryptol. ePrint Arch..
[12] Dan Boneh,et al. Efficient Lattice (H)IBE in the Standard Model , 2010, EUROCRYPT.
[13] Oded Goldreich,et al. Computational complexity: a conceptual perspective , 2008, SIGA.
[14] Brent Waters,et al. Attribute-Based Encryption for Circuits from Multilinear Maps , 2012, CRYPTO.
[15] Leonid A. Levin,et al. A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..
[16] Russell Impagliazzo,et al. Limits on the provable consequences of one-way permutations , 1988, STOC '89.
[17] Yuval Ishai,et al. Priced Oblivious Transfer: How to Sell Digital Goods , 2001, EUROCRYPT.
[18] Leonid A. Levin,et al. A hard-core predicate for all one-way functions , 1989, STOC '89.
[19] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[20] Dmitri Martila,et al. On the Millennium Prize Problems , 2015 .
[21] Craig Gentry,et al. Candidate Multilinear Maps from Ideal Lattices and Applications , 2012, IACR Cryptol. ePrint Arch..
[22] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[23] Martin Tompa,et al. Random self-reducibility and zero knowledge interactive proofs of possession of information , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[24] Rafail Ostrovsky,et al. Resettable Statistical Zero Knowledge , 2012, IACR Cryptol. ePrint Arch..
[25] Andrew Chi-Chih Yao,et al. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[26] SahaiAmit,et al. A complete problem for statistical zero knowledge , 2003 .
[27] Amos Beimel,et al. Secret-Sharing Schemes: A Survey , 2011, IWCC.
[28] Salil P. Vadhan,et al. Derandomization in Cryptography , 2003, SIAM J. Comput..
[29] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[30] Richard M. Karp,et al. Reducibility Among Combinatorial Problems , 1972, 50 Years of Integer Programming.
[31] David Cash,et al. Bonsai Trees, or How to Delegate a Lattice Basis , 2010, Journal of Cryptology.
[32] Kouichi Sakurai,et al. On the Complexity of Constant Round ZKIP of Possession of Knowledge , 1991, ASIACRYPT.
[33] Rafail Ostrovsky,et al. Invariant Signatures and Non-Interactive Zero-Knowledge Proofs are Equivalent (Extended Abstract) , 1992, CRYPTO.
[34] Vinod Vaikuntanathan,et al. Attribute-based encryption for circuits , 2013, STOC '13.
[35] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[36] Moni Naor,et al. Zaps and their applications , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[37] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[38] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[39] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.