Sciweavers

CRYPTO
2010
Springer
157views Cryptology» more  CRYPTO 2010»
14 years 23 days ago
Correcting Errors in RSA Private Keys
Abstract. Let pk = (N , e) be an RSA public key with corresponding secret key sk = (p, q, d, dp, dq , q-1 p ). Assume that we obtain partial error-free information of sk, e.g., ass...
Wilko Henecka, Alexander May, Alexander Meurer
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
14 years 23 days ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
CRYPTO
2010
Springer
110views Cryptology» more  CRYPTO 2010»
14 years 23 days ago
An Efficient and Parallel Gaussian Sampler for Lattices
At the heart of many recent lattice-based cryptographic schemes is a polynomial-time algorithm that, given a `high-quality' basis, generates a lattice point according to a Ga...
Chris Peikert
CRYPTO
2010
Springer
208views Cryptology» more  CRYPTO 2010»
14 years 23 days ago
Improved Delegation of Computation Using Fully Homomorphic Encryption
Following Gennaro, Gentry, and Parno (Cryptology ePrint Archive 2009/547), we use fully homomorphic encryption to design improved schemes for delegating computation. In such schem...
Kai-Min Chung, Yael Kalai, Salil P. Vadhan
CRYPTO
2010
Springer
109views Cryptology» more  CRYPTO 2010»
14 years 23 days ago
Equivalence of Uniform Key Agreement and Composition Insecurity
Chongwon Cho, Chen-Kuei Lee, Rafail Ostrovsky
CRYPTO
2010
Springer
197views Cryptology» more  CRYPTO 2010»
14 years 23 days ago
Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
We present a technique for delegating a short lattice basis that has the advantage of keeping the lattice dimension unchanged upon delegation. Building on this result, we construct...
Shweta Agrawal, Dan Boneh, Xavier Boyen
CRYPTO
2010
Springer
158views Cryptology» more  CRYPTO 2010»
14 years 23 days ago
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography
Motivated by the question of basing cryptographic protocols on stateless tamper-proof hardware tokens, we revisit the question of unconditional two-prover zero-knowledge proofs fo...
Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit ...
CRYPTO
2010
Springer
139views Cryptology» more  CRYPTO 2010»
14 years 23 days ago
Concurrent Non-Malleable Zero Knowledge Proofs
Huijia Lin, Rafael Pass, Wei-Lung Dustin Tseng, Mu...
CRYPTO
2010
Springer
195views Cryptology» more  CRYPTO 2010»
14 years 23 days ago
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
This paper presents a fully secure functional encryption scheme for a wide class of relations, that are specified by non-monotone access structures combined with inner-product rel...
Tatsuaki Okamoto, Katsuyuki Takashima