Two-Client Inner-Product Functional Encryption with an Application to Money-Laundering Detection | 0 | 0.34 | 2022 |
Multi-Client Functional Encryption with Fine-Grained Access Control. | 0 | 0.34 | 2022 |
Unbounded Inner-Product Functional Encryption with Succinct Keys. | 0 | 0.34 | 2019 |
Linearly-Homomorphic Signatures and Scalable Mix-Nets. | 2 | 0.37 | 2019 |
Traceable Inner Product Functional Encryption | 0 | 0.34 | 2019 |
Partially Encrypted Deep Learning using Functional Encryption | 2 | 0.35 | 2019 |
Partially Encrypted Machine Learning using Functional Encryption. | 0 | 0.34 | 2019 |
Fuzzy Password-Authenticated Key Exchange. | 1 | 0.35 | 2018 |
Privacy-Preserving Plaintext-Equality of Low-Entropy Inputs. | 0 | 0.34 | 2018 |
Decentralized Multi-Client Functional Encryption for Inner Product. | 1 | 0.35 | 2018 |
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange | 1 | 0.36 | 2017 |
Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security. | 10 | 0.49 | 2016 |
SPOKE: Simple Password-Only Key Exchange in the Standard Model. | 2 | 0.36 | 2014 |
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages. | 0 | 0.34 | 2013 |
Round-Optimal privacy-preserving protocols with smooth projective hash functions | 20 | 0.68 | 2012 |
Verified security of redundancy-free encryption from Rabin and RSA | 6 | 0.46 | 2012 |
On some incompatible properties of voting schemes | 26 | 0.99 | 2010 |
Mediated Traceable Anonymous Encryption | 3 | 0.40 | 2010 |
Optimal Randomness Extraction from a Diffie-Hellman Element | 17 | 0.80 | 2009 |
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness | 8 | 0.44 | 2009 |
Distributed Public-Key Cryptography from Weak Secrets | 10 | 2.62 | 2009 |
HMAC is a randomness extractor and applications to TLS | 24 | 0.96 | 2008 |
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange | 18 | 0.68 | 2008 |
An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication | 17 | 0.72 | 2008 |
Efficient two-party password-based key exchange protocols in the UC framework | 29 | 0.78 | 2008 |
Extended private information retrieval and its application in biometrics authentications | 29 | 1.23 | 2007 |
An application of the Goldwasser-Micali cryptosystem to biometric authentication | 62 | 1.95 | 2007 |
Strong password-based authentication in TLS using the three-party group Diffie Hellman protocol | 14 | 0.56 | 2007 |
Hardness of distinguishing the MSB or LSB of secret keys in diffie-hellman schemes | 7 | 0.55 | 2006 |
A scalable password-based group key exchange protocol in the standard model | 30 | 0.82 | 2006 |
Password-Based authenticated key exchange in the three-party setting | 219 | 5.76 | 2005 |
Simple password-based encrypted key exchange protocols | 130 | 4.07 | 2005 |
Twin signatures: an alternative to the hash-and-sign paradigm | 24 | 1.09 | 2001 |
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks | 69 | 2.72 | 2001 |