update biblio
This commit is contained in:
parent
2603043d62
commit
e2c747bca3
18
these.bib
18
these.bib
@ -21,7 +21,7 @@
|
|||||||
|
|
||||||
@InProceedings{CS99,
|
@InProceedings{CS99,
|
||||||
author = {Cramer, R. and Shoup, V.},
|
author = {Cramer, R. and Shoup, V.},
|
||||||
title = {Signature Schemes Based On the Strong RSA Assumption},
|
title = {{Signature Schemes Based On the Strong {RSA} Assumption}},
|
||||||
booktitle = {{ACM-CCS}},
|
booktitle = {{ACM-CCS}},
|
||||||
year = {1999},
|
year = {1999},
|
||||||
publisher = {ACM},
|
publisher = {ACM},
|
||||||
@ -1561,7 +1561,7 @@
|
|||||||
|
|
||||||
@InProceedings{CLY09,
|
@InProceedings{CLY09,
|
||||||
author = {Julien Cathalo and Beno\^it Libert and Moti Yung},
|
author = {Julien Cathalo and Beno\^it Libert and Moti Yung},
|
||||||
title = {Group Encryption: Non-Interactive Realization in the Standard Model},
|
title = {{Group Encryption: Non-Interactive Realization in the Standard Model}},
|
||||||
booktitle = {{Asiacrypt}},
|
booktitle = {{Asiacrypt}},
|
||||||
year = {2009},
|
year = {2009},
|
||||||
number = {5912},
|
number = {5912},
|
||||||
@ -2319,7 +2319,7 @@
|
|||||||
|
|
||||||
@InProceedings{BR93,
|
@InProceedings{BR93,
|
||||||
author = {Bellare, Mihir and Rogaway, Phillip},
|
author = {Bellare, Mihir and Rogaway, Phillip},
|
||||||
title = {Random Oracles Are Practical: A Paradigm for Designing Efficient Protocols},
|
title = {{Random Oracles Are Practical: A Paradigm for Designing Efficient Protocols}},
|
||||||
booktitle = {CCS},
|
booktitle = {CCS},
|
||||||
year = {1993},
|
year = {1993},
|
||||||
publisher = {ACM},
|
publisher = {ACM},
|
||||||
@ -2331,13 +2331,13 @@
|
|||||||
@InProceedings{CGH98,
|
@InProceedings{CGH98,
|
||||||
author = {Canetti, Ran and Goldreich, Oded and Halevi, Shai},
|
author = {Canetti, Ran and Goldreich, Oded and Halevi, Shai},
|
||||||
title = {The Random Oracle Methodology, Revisited},
|
title = {The Random Oracle Methodology, Revisited},
|
||||||
|
booktitle = {STOC},
|
||||||
year = {1998},
|
year = {1998},
|
||||||
volume = {45},
|
volume = {45},
|
||||||
publisher = {ACM},
|
publisher = {ACM},
|
||||||
doi = {10.1145/1008731.1008734},
|
doi = {10.1145/1008731.1008734},
|
||||||
issn = {0004-5411},
|
issn = {0004-5411},
|
||||||
issue_date = {July 2004},
|
issue_date = {July 2004},
|
||||||
journal = {STOC},
|
|
||||||
keywords = {CS-proofs, Correlation intractability, cryptography, diagonalization, the random-oracle model},
|
keywords = {CS-proofs, Correlation intractability, cryptography, diagonalization, the random-oracle model},
|
||||||
url = {http://doi.acm.org/10.1145/1008731.1008734},
|
url = {http://doi.acm.org/10.1145/1008731.1008734},
|
||||||
}
|
}
|
||||||
@ -2545,7 +2545,7 @@
|
|||||||
}
|
}
|
||||||
|
|
||||||
@InProceedings{LPJY14,
|
@InProceedings{LPJY14,
|
||||||
author = {Libert, Beno<EFBFBD>t and Peters, Thomas and Joye, Marc and Yung, Moti},
|
author = {Libert, Benoît and Peters, Thomas and Joye, Marc and Yung, Moti},
|
||||||
title = {{Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures}},
|
title = {{Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures}},
|
||||||
booktitle = {Eurocrypt},
|
booktitle = {Eurocrypt},
|
||||||
year = {2014},
|
year = {2014},
|
||||||
@ -2850,4 +2850,12 @@
|
|||||||
note = {\url{https://ia.cr/2002/164}},
|
note = {\url{https://ia.cr/2002/164}},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@InProceedings{LPJY15,
|
||||||
|
author = {Libert, Benoît and Peters, Thomas and Joye, Marc and Yung, Moti},
|
||||||
|
title = {{Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications}},
|
||||||
|
booktitle = {Asiacrypt},
|
||||||
|
year = {2015},
|
||||||
|
pages = {681--707},
|
||||||
|
}
|
||||||
|
|
||||||
@Comment{jabref-meta: databaseType:bibtex;}
|
@Comment{jabref-meta: databaseType:bibtex;}
|
||||||
|
Loading…
Reference in New Issue
Block a user