Pub Date : 2015-12-07DOI: 10.1007/978-3-319-31550-8_3
Naoto Yanai, M. Mambo, Kazuma Tanaka, T. Nishide, E. Okamoto
{"title":"Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs","authors":"Naoto Yanai, M. Mambo, Kazuma Tanaka, T. Nishide, E. Okamoto","doi":"10.1007/978-3-319-31550-8_3","DOIUrl":"https://doi.org/10.1007/978-3-319-31550-8_3","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122012825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-07DOI: 10.1007/978-3-319-31550-8_8
Miguel Urquidi, Dalia Khader, Jean Lancrenon, Liqun Chen
{"title":"Attribute-Based Signatures with Controllable Linkability","authors":"Miguel Urquidi, Dalia Khader, Jean Lancrenon, Liqun Chen","doi":"10.1007/978-3-319-31550-8_8","DOIUrl":"https://doi.org/10.1007/978-3-319-31550-8_8","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125123534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-07DOI: 10.1007/978-3-319-31550-8_13
T. Yasuda, Hiroaki Anada, K. Sakurai
{"title":"Application of NTRU Using Group Rings to Partial Decryption Technique","authors":"T. Yasuda, Hiroaki Anada, K. Sakurai","doi":"10.1007/978-3-319-31550-8_13","DOIUrl":"https://doi.org/10.1007/978-3-319-31550-8_13","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115837911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-07DOI: 10.1007/978-3-319-31550-8_11
Lin Yan, Jian-biao Zhang
{"title":"Research on Trusted Bootstrap Based on the Universal Smart Card","authors":"Lin Yan, Jian-biao Zhang","doi":"10.1007/978-3-319-31550-8_11","DOIUrl":"https://doi.org/10.1007/978-3-319-31550-8_11","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133014897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-07DOI: 10.1007/978-3-319-31550-8_12
Antonio de la Piedra
{"title":"Efficient Implementation of AND, OR and NOT Operators for ABCs","authors":"Antonio de la Piedra","doi":"10.1007/978-3-319-31550-8_12","DOIUrl":"https://doi.org/10.1007/978-3-319-31550-8_12","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123805157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-07DOI: 10.1007/978-3-319-31550-8_4
Huafei Zhu
{"title":"Universally Composable Oblivious Database in the Presence of Malicious Adversaries","authors":"Huafei Zhu","doi":"10.1007/978-3-319-31550-8_4","DOIUrl":"https://doi.org/10.1007/978-3-319-31550-8_4","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116581316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}