首页 > 最新文献

International Conference on Theory and Practice of Public Key Cryptography最新文献

英文 中文
Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-malleable Codes 弹性泄漏、局部可解码和可更新非延展性码的紧上下界
Pub Date : 2017-03-28 DOI: 10.1007/978-3-662-54365-8_13
D. Dachman-Soled, Mukul Kulkarni, Aria Shahverdi
{"title":"Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-malleable Codes","authors":"D. Dachman-Soled, Mukul Kulkarni, Aria Shahverdi","doi":"10.1007/978-3-662-54365-8_13","DOIUrl":"https://doi.org/10.1007/978-3-662-54365-8_13","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132177596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Tightly Secure IBE Under Constant-Size Master Public Key 在恒定大小的主公钥下严密保护IBE
Pub Date : 2017-03-28 DOI: 10.1007/978-3-662-54365-8_9
Jie Chen, Junqing Gong, J. Weng
{"title":"Tightly Secure IBE Under Constant-Size Master Public Key","authors":"Jie Chen, Junqing Gong, J. Weng","doi":"10.1007/978-3-662-54365-8_9","DOIUrl":"https://doi.org/10.1007/978-3-662-54365-8_9","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114988239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Non-malleable Codes with Split-State Refresh 具有分裂状态刷新的不可延展性代码
Pub Date : 2017-03-28 DOI: 10.1007/978-3-662-54365-8_12
Antonio Faonio, J. Nielsen
{"title":"Non-malleable Codes with Split-State Refresh","authors":"Antonio Faonio, J. Nielsen","doi":"10.1007/978-3-662-54365-8_12","DOIUrl":"https://doi.org/10.1007/978-3-662-54365-8_12","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129343191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Provably Secure NTRU Instances over Prime Cyclotomic Rings 素数环上可证明安全的NTRU实例
Pub Date : 2017-03-28 DOI: 10.1007/978-3-662-54365-8_17
Yang Yu, Guangwu Xu, Xiaoyun Wang
{"title":"Provably Secure NTRU Instances over Prime Cyclotomic Rings","authors":"Yang Yu, Guangwu Xu, Xiaoyun Wang","doi":"10.1007/978-3-662-54365-8_17","DOIUrl":"https://doi.org/10.1007/978-3-662-54365-8_17","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131177542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Nearly Optimal Verifiable Data Streaming 近最优可验证数据流
Pub Date : 2016-03-06 DOI: 10.1007/978-3-662-49384-7_16
Johannes Krupp, Dominique Schröder, Mark Simkin, D. Fiore, G. Ateniese, S. Nürnberger
{"title":"Nearly Optimal Verifiable Data Streaming","authors":"Johannes Krupp, Dominique Schröder, Mark Simkin, D. Fiore, G. Ateniese, S. Nürnberger","doi":"10.1007/978-3-662-49384-7_16","DOIUrl":"https://doi.org/10.1007/978-3-662-49384-7_16","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120847462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions Fujisaki-Okamoto结构的密钥依赖信息安全性研究
Pub Date : 2016-03-06 DOI: 10.1007/978-3-662-49384-7_5
Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
{"title":"On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions","authors":"Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka","doi":"10.1007/978-3-662-49384-7_5","DOIUrl":"https://doi.org/10.1007/978-3-662-49384-7_5","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123377139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
CCA-Secure Keyed-Fully Homomorphic Encryption 安全密钥-全同态加密
Pub Date : 2016-03-06 DOI: 10.1007/978-3-662-49384-7_4
Junzuo Lai, R. Deng, Changshe Ma, K. Sakurai, J. Weng
{"title":"CCA-Secure Keyed-Fully Homomorphic Encryption","authors":"Junzuo Lai, R. Deng, Changshe Ma, K. Sakurai, J. Weng","doi":"10.1007/978-3-662-49384-7_4","DOIUrl":"https://doi.org/10.1007/978-3-662-49384-7_4","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129167148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Algebraic Approaches for the Elliptic Curve Discrete Logarithm Problem over Prime Fields 素数域上椭圆曲线离散对数问题的代数方法
Pub Date : 2016-03-06 DOI: 10.1007/978-3-662-49387-8_1
C. Petit, M. Kosters, Ange Messeng
{"title":"Algebraic Approaches for the Elliptic Curve Discrete Logarithm Problem over Prime Fields","authors":"C. Petit, M. Kosters, Ange Messeng","doi":"10.1007/978-3-662-49387-8_1","DOIUrl":"https://doi.org/10.1007/978-3-662-49387-8_1","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129608220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Chosen-Ciphertext Security from Subset Sum 从子集和选择密文安全性
Pub Date : 2016-03-06 DOI: 10.1007/978-3-662-49384-7_2
Sebastian Faust, Daniel Masny, D. Venturi
{"title":"Chosen-Ciphertext Security from Subset Sum","authors":"Sebastian Faust, Daniel Masny, D. Venturi","doi":"10.1007/978-3-662-49384-7_2","DOIUrl":"https://doi.org/10.1007/978-3-662-49384-7_2","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"40 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131692254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Identity-Based Cryptosystems and Quadratic Residuosity 基于身份的密码系统与二次残差
Pub Date : 2016-03-06 DOI: 10.1007/978-3-662-49384-7_9
M. Joye
{"title":"Identity-Based Cryptosystems and Quadratic Residuosity","authors":"M. Joye","doi":"10.1007/978-3-662-49384-7_9","DOIUrl":"https://doi.org/10.1007/978-3-662-49384-7_9","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114778395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
International Conference on Theory and Practice of Public Key Cryptography
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1