Leveled Multikey FHE with constant-size ciphertexts from RLWE. | 0 | 0.34 | 2022 |
<p>R-LWE-Based Distributed Key Generation and Threshold Decryption</p> | 0 | 0.34 | 2021 |
RLWE-Based Zero-Knowledge Proofs for Linear and Multiplicative Relations. | 0 | 0.34 | 2019 |
Lattice-Based Proof of a Shuffle. | 0 | 0.34 | 2019 |
Lattice-based proof of a shuffle. | 0 | 0.34 | 2019 |
Proof of a shuffle for lattice-based cryptography (Full version). | 1 | 0.37 | 2017 |
Proof of a Shuffle for Lattice-Based Cryptography. | 1 | 0.35 | 2017 |
The Kernel Matrix Diffie-Hellman Assumption. | 6 | 0.42 | 2016 |
How to Challenge and Cast Your e-Vote. | 1 | 0.35 | 2016 |
Vote Validatability in Mix-Net-Based eVoting | 0 | 0.34 | 2015 |
Matrix Computational Assumptions in Multilinear Groups. | 0 | 0.34 | 2015 |
Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting. | 1 | 0.35 | 2012 |
Revocable attribute-based signatures with adaptive security in the standard model | 19 | 0.73 | 2011 |
The Security of All Bits Using List Decoding | 6 | 0.48 | 2009 |
Improved certificate-based encryption in the standard model | 22 | 0.74 | 2008 |
Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts | 9 | 0.68 | 2008 |
Extensions of access structures and their cryptographic applications | 0 | 0.34 | 2008 |
On Dynamic Distribution of Private Keys over MANETs | 5 | 0.52 | 2007 |
Cryptographic techniques for mobile ad-hoc networks | 4 | 0.45 | 2007 |
CCA2-secure threshold broadcast encryption with shorter ciphertexts | 21 | 0.94 | 2007 |
Certificate-Based Encryption Without Random Oracles | 10 | 0.56 | 2006 |
Breaking yum and lee generic constructions of certificate-less and certificate-based encryption schemes | 29 | 1.20 | 2006 |
Fujisaki–Okamoto hybrid encryption revisited | 5 | 0.46 | 2005 |
Fujisaki-Okamoto IND-CCA hybrid encryption revisited | 2 | 1.36 | 2003 |
Linear broadcast encryption schemes | 10 | 0.62 | 2003 |
An Ind-Cpa Cryptosystem From Demytko'S Primitive | 0 | 0.34 | 2003 |
Linear Key Predistribution Schemes | 6 | 0.48 | 2002 |
An efficient semantically secure elliptic curve cryptosystem based on KMOV. | 7 | 0.55 | 2002 |
A semantically secure elliptic curve RSA scheme with small expansion factor | 0 | 0.34 | 2002 |
Linear broadcast encryption schemes. | 0 | 0.34 | 2001 |
Computing the order of points on an elliptic curve modulo N is as difficult as factoring N | 1 | 0.36 | 2001 |
A New Algorithm for Smart Cards | 0 | 0.34 | 1996 |