Adaptive Oblivious Transfer with Access Control from Lattice Assumptions
暂无分享,去创建一个
Huaxiong Wang | Benoît Libert | San Ling | Khoa Nguyen | Fabrice Mouhartem | Huaxiong Wang | Benoît Libert | S. Ling | Fabrice Mouhartem | Khoa Nguyen
[1] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[2] David A. Mix Barrington,et al. Bounded-width polynomial-size branching programs recognize exactly those languages in NC1 , 1986, STOC '86.
[3] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[4] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[5] Jacques Stern,et al. A new paradigm for public key identification , 1996, IEEE Trans. Inf. Theory.
[6] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[7] Rafail Ostrovsky,et al. Conditional Oblivious Transfer and Timed-Release Encryption , 1999, EUROCRYPT.
[8] Moni Naor,et al. Oblivious Transfer with Adaptive Queries , 1999, CRYPTO.
[9] Moni Naor,et al. Distributed Oblivious Transfer , 2000, ASIACRYPT.
[10] Ernest F. Brickell,et al. Design Validations for Discrete Logarithm Based Signature Schemes , 2000, Public Key Cryptography.
[11] Yuval Ishai,et al. Priced Oblivious Transfer: How to Sell Digital Goods , 2001, EUROCRYPT.
[12] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[13] Moni Naor,et al. Efficient oblivious transfer protocols , 2001, SODA '01.
[14] Ivan Damgård,et al. Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption , 2003, CRYPTO.
[15] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[16] Moni Naor,et al. Computationally Secure Oblivious Transfer , 2004, Journal of Cryptology.
[17] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[18] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[19] Benny Pinkas,et al. Keyword Search and Oblivious Pseudorandom Functions , 2005, TCC.
[20] Yael Tauman Kalai. Smooth Projective Hashing and Two-Message Oblivious Transfer , 2005, EUROCRYPT.
[21] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[22] Anat Paskin-Cherniavsky,et al. Evaluating Branching Programs on Encrypted Data , 2007, TCC.
[23] Craig Gentry,et al. Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..
[24] Abhi Shelat,et al. Simulatable Adaptive Oblivious Transfer , 2007, EUROCRYPT.
[25] Matthew Green,et al. Blind Identity-Based Encryption and Simulatable Oblivious Transfer , 2007, ASIACRYPT.
[26] Yehuda Lindell,et al. Efficient Fully-Simulatable Oblivious Transfer , 2008, Chic. J. Theor. Comput. Sci..
[27] Keisuke Tanaka,et al. Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems , 2008, ASIACRYPT.
[28] Brent Waters,et al. A Framework for Efficient and Composable Oblivious Transfer , 2008, CRYPTO.
[29] Kazuki Yoneyama,et al. Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures , 2008, ACNS.
[30] Matthew Green,et al. Universally Composable Adaptive Oblivious Transfer , 2008, IACR Cryptol. ePrint Arch..
[31] Helger Lipmaa. Private Branching Programs: On Communication-Efficient Cryptocomputing , 2008, IACR Cryptol. ePrint Arch..
[32] Jan Camenisch,et al. Oblivious transfer with access control , 2009, IACR Cryptol. ePrint Arch..
[33] Matthew Green,et al. Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials , 2009, Public Key Cryptography.
[34] Brent Waters,et al. Short and Stateless Signatures from the RSA Assumption , 2009, CRYPTO.
[35] Xiaomin Liu,et al. Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection , 2009, TCC.
[36] Jonathan Katz,et al. A Group Signature Scheme from Lattice Assumptions , 2010, IACR Cryptol. ePrint Arch..
[37] Xavier Boyen,et al. Lattice Mixing and Vanishing Trapdoors A Framework for Fully Secure Short Signatures and more , 2010 .
[38] Matthew Green,et al. Practical Adaptive Oblivious Transfer from Simple Assumptions , 2011, IACR Cryptol. ePrint Arch..
[39] Dan Boneh,et al. Efficient Lattice (H)IBE in the Standard Model , 2010, EUROCRYPT.
[40] Yael Tauman Kalai,et al. Smooth Projective Hashing and Two-Message Oblivious Transfer , 2005, Journal of Cryptology.
[41] Siu-Ming Yiu,et al. Oblivious Transfer with Access Control : Realizing Disjunction without Duplication , 2010, Pairing.
[42] Kaoru Kurosawa,et al. Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption , 2010, SCN.
[43] Chris Peikert,et al. Generating Shorter Bases for Hard Random Lattices , 2009, Theory of Computing Systems.
[44] Generic Fully Simulatable Adaptive Oblivious Transfer , 2011, ACNS.
[45] Javier Herranz. Restricted adaptive oblivious transfer , 2011, Theor. Comput. Sci..
[46] David Cash,et al. Bonsai Trees, or How to Delegate a Lattice Basis , 2010, Journal of Cryptology.
[47] Chris Peikert,et al. Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller , 2012, IACR Cryptol. ePrint Arch..
[48] Jan Camenisch,et al. Oblivious Transfer with Hidden Access Control Policies , 2011, Public Key Cryptography.
[49] Jan Camenisch,et al. Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption , 2012, SCN.
[50] Vinod Vaikuntanathan,et al. Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE , 2012, EUROCRYPT.
[51] Jan Camenisch,et al. Universally composable adaptive oblivious transfer (with access control) from standard assumptions , 2013, Digital Identity Management.
[52] Damien Stehlé,et al. Classical hardness of learning with errors , 2013, STOC '13.
[53] Brent Waters,et al. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based , 2013, CRYPTO.
[54] Damien Stehlé,et al. Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications , 2013, Public Key Cryptography.
[55] Tibor Jager,et al. Confined Guessing: New Signatures From Standard Assumptions , 2014, Journal of Cryptology.
[56] Dhinakaran Vinayagamurthy,et al. Riding on Asymmetry: Efficient ABE for Branching Programs , 2015, ASIACRYPT.
[57] Huaxiong Wang,et al. Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based , 2015, Public Key Cryptography.
[58] Tatsuaki Okamoto,et al. Packing Messages and Optimizing Bootstrapping in GSW-FHE , 2015, Public Key Cryptography.
[59] Huaxiong Wang,et al. Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption , 2016, ASIACRYPT.
[60] Damien Stehlé,et al. Sanitization of FHE Ciphertexts , 2016, EUROCRYPT.
[61] Hoeteck Wee,et al. FHE Circuit Privacy Almost for Free , 2016, CRYPTO.
[62] Huaxiong Wang,et al. Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors , 2016, Journal of Cryptology.
[63] Huaxiong Wang,et al. Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions , 2016, ASIACRYPT.
[64] Nico Döttling,et al. Two-Message, Oblivious Evaluation of Cryptographic Functionalities , 2016, CRYPTO.
[65] Silvio Micali,et al. A Completeness Theorem for Protocols with Honest Majority , 1987, STOC 1987.