Sciweavers

135 search results - page 6 / 27
» Adaptive Security of Symbolic Encryption
Sort
View
CRYPTO
2012
Springer
262views Cryptology» more  CRYPTO 2012»
12 years 7 days ago
Functional Encryption with Bounded Collusions via Multi-party Computation
We construct a functional encryption scheme secure against an a-priori bounded polynomial number of collusions for the class of all polynomial-size circuits. Our constructions req...
Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
CCS
2009
ACM
14 years 4 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
14 years 4 months ago
Secure Mediation of Join Queries by Processing Ciphertexts
In a secure mediated information system, confidentiality is one of the main concerns when transmitting data from datasources to clients via a mediator. We present three approache...
Joachim Biskup, Christian Tsatedem, Lena Wiese
ASIACRYPT
2009
Springer
14 years 4 months ago
Improved Non-committing Encryption with Applications to Adaptively Secure Protocols
We present a new construction of non-committing encryption schemes. Unlike the previous constructions of Canetti et al. (STOC ’96) and of Damg˚ard and Nielsen (Crypto ’00), ou...
Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, H...
CRYPTO
2009
Springer
127views Cryptology» more  CRYPTO 2009»
14 years 4 months ago
Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer
Juan A. Garay, Daniel Wichs, Hong-Sheng Zhou