Pub Date : 2018-09-05DOI: 10.1007/978-3-319-98113-0_30
Junqing Gong, Benoît Libert, Somindu C. Ramanna
{"title":"Compact IBBE and Fuzzy IBE from Simple Assumptions","authors":"Junqing Gong, Benoît Libert, Somindu C. Ramanna","doi":"10.1007/978-3-319-98113-0_30","DOIUrl":"https://doi.org/10.1007/978-3-319-98113-0_30","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123687996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-05DOI: 10.1007/978-3-319-98113-0_13
Roi Inbar, Eran Omri, Benny Pinkas
{"title":"Efficient Scalable Multiparty Private Set-Intersection via Garbled Bloom Filters","authors":"Roi Inbar, Eran Omri, Benny Pinkas","doi":"10.1007/978-3-319-98113-0_13","DOIUrl":"https://doi.org/10.1007/978-3-319-98113-0_13","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117042775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-05DOI: 10.1007/978-3-319-98113-0_26
J. Hwang, Stanislaw Jarecki, Taekyoung Kwon, Joohee Lee, J. Shin, Jiayu Xu
{"title":"Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange","authors":"J. Hwang, Stanislaw Jarecki, Taekyoung Kwon, Joohee Lee, J. Shin, Jiayu Xu","doi":"10.1007/978-3-319-98113-0_26","DOIUrl":"https://doi.org/10.1007/978-3-319-98113-0_26","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133141581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-05DOI: 10.1007/978-3-319-98113-0_11
Karim M. El Defrawy, R. Ostrovsky, Sunoo Park, M. Yung
{"title":"Proactive Secure Multiparty Computation with a Dishonest Majority","authors":"Karim M. El Defrawy, R. Ostrovsky, Sunoo Park, M. Yung","doi":"10.1007/978-3-319-98113-0_11","DOIUrl":"https://doi.org/10.1007/978-3-319-98113-0_11","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121593491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-05DOI: 10.1007/978-3-319-98113-0_5
D. Jost, U. Maurer
{"title":"Security Definitions for Hash Functions: Combining UCE and Indifferentiability","authors":"D. Jost, U. Maurer","doi":"10.1007/978-3-319-98113-0_5","DOIUrl":"https://doi.org/10.1007/978-3-319-98113-0_5","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133365644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-05DOI: 10.1007/978-3-319-98113-0_22
Y. Kang, Chengyu Lin, T. Malkin, Mariana Raykova
{"title":"Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation","authors":"Y. Kang, Chengyu Lin, T. Malkin, Mariana Raykova","doi":"10.1007/978-3-319-98113-0_22","DOIUrl":"https://doi.org/10.1007/978-3-319-98113-0_22","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129210910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-05DOI: 10.1007/978-3-319-98113-0_28
M. Joye, Alain Passelègue
{"title":"Function-Revealing Encryption - Definitions and Constructions","authors":"M. Joye, Alain Passelègue","doi":"10.1007/978-3-319-98113-0_28","DOIUrl":"https://doi.org/10.1007/978-3-319-98113-0_28","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116477739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-05DOI: 10.1007/978-3-319-98113-0_2
Ai Ishida, Yusuke Sakai, K. Emura, Goichiro Hanaoka, Keisuke Tanaka
{"title":"Fully Anonymous Group Signature with Verifier-Local Revocation","authors":"Ai Ishida, Yusuke Sakai, K. Emura, Goichiro Hanaoka, Keisuke Tanaka","doi":"10.1007/978-3-319-98113-0_2","DOIUrl":"https://doi.org/10.1007/978-3-319-98113-0_2","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124221009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}