Pub Date : 2014-09-03DOI: 10.1007/978-3-319-10879-7_12
Ashish Choudhury, A. Patra, N. Smart
{"title":"Reducing the Overhead of MPC over a Large Population","authors":"Ashish Choudhury, A. Patra, N. Smart","doi":"10.1007/978-3-319-10879-7_12","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_12","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129202397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-03DOI: 10.1007/978-3-319-10879-7_28
Y. Dodis, D. Fiore
{"title":"Interactive Encryption and Message Authentication","authors":"Y. Dodis, D. Fiore","doi":"10.1007/978-3-319-10879-7_28","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_28","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124912690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-03DOI: 10.1007/978-3-319-10879-7_27
J. Alwen, M. Hirt, U. Maurer, A. Patra, Pavel Raykov
{"title":"Key-Indistinguishable Message Authentication Codes","authors":"J. Alwen, M. Hirt, U. Maurer, A. Patra, Pavel Raykov","doi":"10.1007/978-3-319-10879-7_27","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_27","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122034583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-03DOI: 10.1007/978-3-319-10879-7_4
Omkant Pandey, Kim Ramchen, Brent Waters
{"title":"Relaxed Two-to-One Recoding Schemes","authors":"Omkant Pandey, Kim Ramchen, Brent Waters","doi":"10.1007/978-3-319-10879-7_4","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_4","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"10 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133019795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-03DOI: 10.1007/978-3-319-10879-7_10
Joshua Lampkins, R. Ostrovsky
{"title":"Communication-Efficient MPC for General Adversary Structures","authors":"Joshua Lampkins, R. Ostrovsky","doi":"10.1007/978-3-319-10879-7_10","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_10","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122011177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-03DOI: 10.1007/978-3-319-10879-7_26
Muthuramakrishnan Venkitasubramaniam
{"title":"On Adaptively Secure Protocols","authors":"Muthuramakrishnan Venkitasubramaniam","doi":"10.1007/978-3-319-10879-7_26","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_26","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132951445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-03DOI: 10.1007/978-3-319-10879-7_34
D. Naccache, R. Steinwandt, A. Corona, M. Yung
{"title":"Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption","authors":"D. Naccache, R. Steinwandt, A. Corona, M. Yung","doi":"10.1007/978-3-319-10879-7_34","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_34","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125236805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-03DOI: 10.1007/978-3-319-10879-7_6
Sanjam Garg
{"title":"Program Obfuscation via Multilinear Maps","authors":"Sanjam Garg","doi":"10.1007/978-3-319-10879-7_6","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_6","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116038778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-03DOI: 10.1007/978-3-319-10879-7_32
Takashi Yamakawa, Shota Yamada, K. Nuida, Goichiro Hanaoka, N. Kunihiro
{"title":"Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues","authors":"Takashi Yamakawa, Shota Yamada, K. Nuida, Goichiro Hanaoka, N. Kunihiro","doi":"10.1007/978-3-319-10879-7_32","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_32","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128437121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-03DOI: 10.1007/978-3-319-10879-7_30
Nikolaos P. Karvelas, A. Kiayias
{"title":"Efficient Proofs of Secure Erasure","authors":"Nikolaos P. Karvelas, A. Kiayias","doi":"10.1007/978-3-319-10879-7_30","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_30","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134459066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}