default search action
ASIACRYPT 2015: Auckland, New Zealand
- Tetsu Iwata, Jung Hee Cheon:
Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9452, Springer 2015, ISBN 978-3-662-48796-9
Best Paper
- Shi Bai, Adeline Langlois, Tancrède Lepoint, Damien Stehlé, Ron Steinfeld:
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather Than the Statistical Distance. 3-24
Indistinguishability Obfuscation
- Saikrishna Badrinarayanan, Divya Gupta, Abhishek Jain, Amit Sahai:
Multi-input Functional Encryption for Unbounded Arity Functions. 27-51 - Dakshita Khurana, Vanishree Rao, Amit Sahai:
Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation. 52-75
PRFs and Hashes
- Susan Hohenberger, Venkata Koppula, Brent Waters:
Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model. 79-102 - Michel Abdalla, Fabrice Benhamouda, Alain Passelègue:
Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security. 103-120 - Tatsuaki Okamoto, Krzysztof Pietrzak, Brent Waters, Daniel Wichs:
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators. 121-145
Discrete Logarithms and Number Theory
- Aurore Guillevic:
Computing Individual Discrete Logarithms Faster in GF(p n ) with the NFS-DL Algorithm. 149-173 - Taechan Kim:
Multiple Discrete Logarithm Problems with Auxiliary Inputs. 174-188 - Yao Lu, Rui Zhang, Liqiang Peng, Dongdai Lin:
Solving Linear Equations Modulo Unknown Divisors: Revisited. 189-213 - Craig Costello, Patrick Longa:
Fourℚ: Four-Dimensional Decompositions on a ℚ-curve over the Mersenne Prime. 214-235
Signatures
- Jens Groth:
Efficient Fully Structure-Preserving Signatures for Large Messages. 239-259 - Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen, Huaxiong Wang:
A Provably Secure Group Signature Scheme from Code-Based Assumptions. 260-285 - Sanjit Chatterjee, Alfred Menezes:
Type 2 Structure-Preserving Signature Schemes Revisited. 286-310 - Albrecht Petzoldt, Ming-Shing Chen, Bo-Yin Yang, Chengdong Tao, Jintai Ding:
Design Principles for HFEv- Based Multivariate Signature Schemes. 311-334
Multiparty Computation I
- Dana Dachman-Soled, Chang Liu, Charalampos Papamanthou, Elaine Shi, Uzi Vishkin:
Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness. 337-359 - Sky Faber, Stanislaw Jarecki, Sotirios Kentros, Boyang Wei:
Three-Party ORAM for Secure Computation. 360-385 - Vladimir Kolesnikov, Ranjit Kumaresan:
On Cut-and-Choose Oblivious Transfer and Its Variants. 386-412
Public Key Encryption
- Takahiro Matsuda, Goichiro Hanaoka:
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption. 415-442 - Carmit Hazay, Arpita Patra, Bogdan Warinschi:
Selective Opening Security for Receivers. 443-469 - Allison Bishop, Abhishek Jain, Lucas Kowalczyk:
Function-Hiding Inner Product Encryption. 470-491
ABE and IBE
- Dennis Hofheinz, Christian Matt, Ueli Maurer:
Idealizing Identity-Based Encryption. 495-520 - Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:
A Framework for Identity-Based Encryption with Almost Tight Security. 521-549 - Sergey Gorbunov, Dhinakaran Vinayagamurthy:
Riding on Asymmetry: Efficient ABE for Branching Programs. 550-574 - Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:
Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs. 575-601
Zero-Knowledge
- Alonso González, Alejandro Hevia, Carla Ràfols:
QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions. 605-629 - Charanjit S. Jutla, Arnab Roy:
Dual-System Simulation-Soundness with Applications to UC-PAKE and More. 630-655 - Vinod Vaikuntanathan, Prashant Nalini Vasudevan:
Secret Sharing and Statistical Zero Knowledge. 656-680 - Benoît Libert, Thomas Peters, Marc Joye, Moti Yung:
Compactly Hiding Linear Spans - Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications. 681-707
Multiparty Computation II
- Tore Kasper Frederiksen, Marcel Keller, Emmanuela Orsini, Peter Scholl:
A Unified Approach to MPC with Preprocessing Using OT. 711-735 - Abhi Shelat, Muthuramakrishnan Venkitasubramaniam:
Secure Computation from Millionaire. 736-757 - Carmen Kempka, Ryo Kikuchi, Susumu Kiyoshima, Koutarou Suzuki:
Garbling Scheme for Formulas with Constant Size of Garbled Gates. 758-782 - Alexander Koch, Stefan Walzer, Kevin Härtel:
Card-Based Cryptographic Protocols Using a Minimal Number of Cards. 783-807
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.