首页 > 最新文献

International Conference on Theory and Practice of Public Key Cryptography最新文献

英文 中文
Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings 非交互cca2安全阈值密码系统:在无配对的标准模型中实现自适应安全
Pub Date : 2021-05-10 DOI: 10.1007/978-3-030-75245-3_24
Julien Devevey, Benoît Libert, Khoa Nguyen, Thomas Peters, M. Yung
{"title":"Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings","authors":"Julien Devevey, Benoît Libert, Khoa Nguyen, Thomas Peters, M. Yung","doi":"10.1007/978-3-030-75245-3_24","DOIUrl":"https://doi.org/10.1007/978-3-030-75245-3_24","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121696176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Constraining and Watermarking PRFs from Milder Assumptions 从较温和的假设约束和水印PRFs
Pub Date : 2020-05-04 DOI: 10.1007/978-3-030-45374-9_15
Chris Peikert, Sina Shiehian
{"title":"Constraining and Watermarking PRFs from Milder Assumptions","authors":"Chris Peikert, Sina Shiehian","doi":"10.1007/978-3-030-45374-9_15","DOIUrl":"https://doi.org/10.1007/978-3-030-45374-9_15","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115455947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Updateable Inner Product Argument with Logarithmic Verifier and Applications 具有对数验证的可更新内积参数及其应用
Pub Date : 2020-05-04 DOI: 10.1007/978-3-030-45374-9_18
Vanesa Daza, Carla Ràfols, Alexandros Zacharakis
{"title":"Updateable Inner Product Argument with Logarithmic Verifier and Applications","authors":"Vanesa Daza, Carla Ràfols, Alexandros Zacharakis","doi":"10.1007/978-3-030-45374-9_18","DOIUrl":"https://doi.org/10.1007/978-3-030-45374-9_18","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125035614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More 具有多项式模格的几乎严密安全性- PRF、IBE、全部但多LTF等
Pub Date : 2020-05-04 DOI: 10.1007/978-3-030-45374-9_22
Qiqi Lai, Feng-Hao Liu, Zhedong Wang
{"title":"Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More","authors":"Qiqi Lai, Feng-Hao Liu, Zhedong Wang","doi":"10.1007/978-3-030-45374-9_22","DOIUrl":"https://doi.org/10.1007/978-3-030-45374-9_22","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128938449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Mon$mathbb {Z}_{2^{k}}$a: Fast Maliciously Secure Two Party Computation on $mathbb {Z}_{2^{k}}$ Mon$mathbb {Z}_{2^{k}}$a: $mathbb {Z}_{2^{k}}$上的快速恶意安全双方计算
Pub Date : 2020-05-04 DOI: 10.1007/978-3-030-45388-6_13
D. Catalano, M. Raimondo, D. Fiore, Irene Giacomelli
{"title":"Mon$mathbb {Z}_{2^{k}}$a: Fast Maliciously Secure Two Party Computation on $mathbb {Z}_{2^{k}}$","authors":"D. Catalano, M. Raimondo, D. Fiore, Irene Giacomelli","doi":"10.1007/978-3-030-45388-6_13","DOIUrl":"https://doi.org/10.1007/978-3-030-45388-6_13","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128319242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation Soundness 非交互零知识参数的黑盒扩展,以及直接来自仿真可靠性的签名
Pub Date : 2020-05-04 DOI: 10.1007/978-3-030-45374-9_19
Masayuki Abe, Miguel Ambrona, Miyako Ohkubo
{"title":"On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation Soundness","authors":"Masayuki Abe, Miguel Ambrona, Miyako Ohkubo","doi":"10.1007/978-3-030-45374-9_19","DOIUrl":"https://doi.org/10.1007/978-3-030-45374-9_19","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130638417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Short-List of Pairing-Friendly Curves Resistant to Special TNFS at the 128-Bit Security Level 128位安全级别下抗特殊TNFS的配对友好曲线短列表
Pub Date : 2020-05-04 DOI: 10.1007/978-3-030-45388-6_19
Aurore Guillevic
{"title":"A Short-List of Pairing-Friendly Curves Resistant to Special TNFS at the 128-Bit Security Level","authors":"Aurore Guillevic","doi":"10.1007/978-3-030-45388-6_19","DOIUrl":"https://doi.org/10.1007/978-3-030-45388-6_19","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133385042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Improved Classical Cryptanalysis of SIKE in Practice 改进的SIKE经典密码分析方法
Pub Date : 2020-05-04 DOI: 10.1007/978-3-030-45388-6_18
Craig Costello, P. Longa, M. Naehrig, Joost Renes, Fernando Virdia
{"title":"Improved Classical Cryptanalysis of SIKE in Practice","authors":"Craig Costello, P. Longa, M. Naehrig, Joost Renes, Fernando Virdia","doi":"10.1007/978-3-030-45388-6_18","DOIUrl":"https://doi.org/10.1007/978-3-030-45388-6_18","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128168299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2 保护隐私的认证密钥交换与IKEv2案例
Pub Date : 2020-05-04 DOI: 10.1007/978-3-030-45388-6_20
Sven Schäge, Jörg Schwenk, S. Lauer
{"title":"Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2","authors":"Sven Schäge, Jörg Schwenk, S. Lauer","doi":"10.1007/978-3-030-45388-6_20","DOIUrl":"https://doi.org/10.1007/978-3-030-45388-6_20","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121785337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Sublinear-Round Byzantine Agreement Under Corrupt Majority 腐败多数下的次线性回合拜占庭协议
Pub Date : 2020-05-04 DOI: 10.1007/978-3-030-45388-6_9
T-H. Hubert Chan, R. Pass, E. Shi
{"title":"Sublinear-Round Byzantine Agreement Under Corrupt Majority","authors":"T-H. Hubert Chan, R. Pass, E. Shi","doi":"10.1007/978-3-030-45388-6_9","DOIUrl":"https://doi.org/10.1007/978-3-030-45388-6_9","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124506478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
期刊
International Conference on Theory and Practice of Public Key Cryptography
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1