Sciweavers

PKC
2015
Springer
29views Cryptology» more  PKC 2015»
8 years 7 months ago
Anonymous Transferable E-Cash
Cryptographic e-cash allows off-line electronic transactions between a bank, users and merchants in a secure and anonymous fashion. A plethora of e-cash constructions has been pro...
Foteini Baldimtsi, Melissa Chase, Georg Fuchsbauer...
PKC
2015
Springer
9views Cryptology» more  PKC 2015»
8 years 7 months ago
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks
Michel Abdalla, Fabrice Benhamouda, David Pointche...
PKC
2015
Springer
11views Cryptology» more  PKC 2015»
8 years 7 months ago
Simple Lattice Trapdoor Sampling from a Broad Class of Distributions
Vadim Lyubashevsky, Daniel Wichs
PKC
2015
Springer
18views Cryptology» more  PKC 2015»
8 years 7 months ago
On the Practical Security of Inner Product Functional Encryption
Functional Encryption (FE) is an exciting new paradigm that extends the notion of public key encryption. In this work we explore the security of Inner Product Functional Encryptio...
Shashank Agrawal, Shweta Agrawal, Saikrishna Badri...
PKC
2015
Springer
14views Cryptology» more  PKC 2015»
8 years 7 months ago
Digital Signatures from Strong RSA without Prime Generation
Abstract. We construct a signature scheme that is proved secure, without random oracles, under the strong RSA assumption. Unlike other efficient strong-RSA based schemes, the new ...
David Cash, Rafael Dowsley, Eike Kiltz
PKC
2015
Springer
16views Cryptology» more  PKC 2015»
8 years 7 months ago
Simple Functional Encryption Schemes for Inner Products
Functional encryption is a new paradigm that allows users to finely control the amount of information that is revealed by a ciphertext to a given receiver. Recent papers have foc...
Michel Abdalla, Florian Bourse, Angelo De Caro, Da...
PKC
2015
Springer
19views Cryptology» more  PKC 2015»
8 years 7 months ago
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds
Recent work on structure-preserving signatures studies optimality of these schemes in terms of the number of group elements needed in the verification key and the signature, and t...
Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andr...
PKC
2015
Springer
13views Cryptology» more  PKC 2015»
8 years 7 months ago
Interactive Message-Locked Encryption and Secure Deduplication
This paper considers the problem of secure storage of outsourced data in a way that permits deduplication. We are for the first time able to provide privacy for messages that are...
Mihir Bellare, Sriram Keelveedhi
PKC
2015
Springer
14views Cryptology» more  PKC 2015»
8 years 7 months ago
How Secure is Deterministic Encryption?
Mihir Bellare, Rafael Dowsley, Sriram Keelveedhi