Pub Date : 2016-08-31DOI: 10.1007/978-3-319-44618-9_27
A. Beimel, O. Farràs, Naty Peter
{"title":"Secret Sharing Schemes for Dense Forbidden Graphs","authors":"A. Beimel, O. Farràs, Naty Peter","doi":"10.1007/978-3-319-44618-9_27","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_27","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126038469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-31DOI: 10.1007/978-3-319-44618-9_14
E. Fujisaki
{"title":"Improving Practical UC-Secure Commitments Based on the DDH Assumption","authors":"E. Fujisaki","doi":"10.1007/978-3-319-44618-9_14","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_14","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129495370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-31DOI: 10.1007/978-3-319-44618-9_1
Jongkil Kim, W. Susilo, F. Guo, M. Au
{"title":"A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups","authors":"Jongkil Kim, W. Susilo, F. Guo, M. Au","doi":"10.1007/978-3-319-44618-9_1","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_1","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128361906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-31DOI: 10.1007/978-3-319-44618-9_24
Tatiana Bradley, Sky Faber, G. Tsudik
{"title":"Bounded Size-Hiding Private Set Intersection","authors":"Tatiana Bradley, Sky Faber, G. Tsudik","doi":"10.1007/978-3-319-44618-9_24","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_24","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"2004 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127316948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-31DOI: 10.1007/978-3-319-44618-9_13
Yi Deng, J. Garay, S. Ling, Huaxiong Wang, M. Yung
{"title":"On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs","authors":"Yi Deng, J. Garay, S. Ling, Huaxiong Wang, M. Yung","doi":"10.1007/978-3-319-44618-9_13","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_13","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"426 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126720464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-31DOI: 10.1007/978-3-319-44618-9_6
J. Camenisch, Robert R. Enderlein, U. Maurer
{"title":"Memory Erasability Amplification","authors":"J. Camenisch, Robert R. Enderlein, U. Maurer","doi":"10.1007/978-3-319-44618-9_6","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_6","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131318514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-31DOI: 10.1007/978-3-319-44618-9_15
Rafaël del Pino, Vadim Lyubashevsky, D. Pointcheval
{"title":"The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs","authors":"Rafaël del Pino, Vadim Lyubashevsky, D. Pointcheval","doi":"10.1007/978-3-319-44618-9_15","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_15","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125430329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attribute-Based Encryption for Range Attributes","authors":"Nuttapong Attrapadung, Goichiro Hanaoka, Kazuto Ogawa, G. Ohtake, Hajime Watanabe, Shota Yamada","doi":"10.1007/978-3-319-44618-9_3","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_3","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125512995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-03DOI: 10.1007/978-3-319-10879-7_33
R. Ostrovsky, V. Rao, Ivan Visconti
{"title":"On Selective-Opening Attacks against Encryption Schemes","authors":"R. Ostrovsky, V. Rao, Ivan Visconti","doi":"10.1007/978-3-319-10879-7_33","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_33","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116856085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-03DOI: 10.1007/978-3-319-10879-7_15
Andrea G. Forte, J. Garay, T. Jim, Yevgeniy Vahlis
{"title":"EyeDecrypt - Private Interactions in Plain Sight","authors":"Andrea G. Forte, J. Garay, T. Jim, Yevgeniy Vahlis","doi":"10.1007/978-3-319-10879-7_15","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_15","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128482045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}