Strongly Secure Identity-Based Key Exchange With Single Pairing Operation | 0 | 0.34 | 2021 |
How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes. | 4 | 0.39 | 2017 |
Garbling Scheme for Formulas with Constant Size of Garbled Gates. | 2 | 0.36 | 2016 |
Secure Multi-Party Computation for Elliptic Curves. | 0 | 0.34 | 2014 |
Converting PKI-Based Authenticated Key Exchange to Identity-Based | 0 | 0.34 | 2014 |
Id-Eck Secure Id-Based Authenticated Key Exchange On Symmetric And Asymmetric Pairing | 3 | 0.38 | 2013 |
Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles. | 1 | 0.36 | 2013 |
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism | 11 | 0.55 | 2013 |
Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange | 16 | 0.62 | 2013 |
Message Recovery Signature Schemes From Sigma-Protocols | 1 | 0.35 | 2013 |
Sufficient condition for ephemeral key-leakage resilient tripartite key exchange | 6 | 0.44 | 2012 |
Strongly Secure Predicate-Based Authenticated Key Exchange: Definition And Constructions | 3 | 0.40 | 2012 |
Strongly secure authenticated key exchange from factoring, codes, and lattices | 36 | 1.05 | 2012 |
Sufficient condition for identity-based authenticated key exchange resilient to leakage of secret keys | 3 | 0.39 | 2011 |
Anonymous Hierarchical Identity-Based Encryption With Short Ciphertexts | 7 | 0.48 | 2011 |
Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys | 14 | 0.58 | 2011 |
Ephemeral key leakage resilient and efficient ID-AKEs that can share identities, private and master keys | 4 | 0.40 | 2010 |
Anonymizable signature and its construction from pairings | 0 | 0.34 | 2010 |
Hierarchical ID-based authenticated key exchange resilient to ephemeral key leakage | 0 | 0.34 | 2010 |
Predicate-based authenticated key exchange resilient to ephemeral key leakage | 4 | 0.44 | 2010 |
Secure Keyword Auction: Preserving Privacy of Bidding Prices and CTRs | 1 | 0.39 | 2009 |
Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols. | 0 | 0.34 | 2009 |
Relinkable Ring Signature | 1 | 0.36 | 2009 |
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts | 58 | 1.45 | 2009 |
Non-optimistic Secure Circuit Evaluation Based on ElGamal Encryption and Its Applications | 3 | 0.70 | 2007 |
Fully Resilient Traitor Tracing Scheme using Key Update. | 0 | 0.34 | 2007 |
Traceable Ring Signature | 13 | 0.59 | 2006 |
Secure Multi-attribute Procurement Auction | 2 | 0.39 | 2005 |
RFID privacy issues and technical challenges | 80 | 4.61 | 2005 |
Efficient, non-optimistic secure circuit evaluation based on the elgamal encryption | 1 | 0.36 | 2005 |
Generalized Vickrey Auction And Suppression Of Active Adversary Using Incentive-Compatible Implementation | 0 | 0.34 | 2005 |
Secure Generalized Vickrey Auction without Third-party Servers | 11 | 0.74 | 2004 |
Secure Generalized Vickrey Auction Using Homomorphic Encryption | 32 | 1.63 | 2003 |
Receipt-Free Sealed-Bid Auction | 26 | 1.08 | 2002 |
M+1-st Price Auction Using Homomorphic Encryption | 59 | 2.22 | 2002 |
Secure combinatorial auctions by dynamic programming with polynomial secret sharing | 34 | 1.68 | 2002 |
Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions | 46 | 1.95 | 2002 |
Efficient Sealed-Bid Auction Using Hash Chain | 36 | 1.53 | 2000 |