% Encoding: windows-1252 @InCollection{BCKL08, author = {Belenkiy, Mira and Chase, Melissa and Kohlweiss, Markulf and Lysyanskaya, Anna}, title = {{P}-signatures and Noninteractive Anonymous Credentials}, booktitle = {{TCC}}, publisher = {Springer}, year = {2008}, number = {4948}, series = {LNCS}, } @InCollection{CL04, author = {Camenisch, Jan and Lysyanskaya, Anna}, title = {Signature Schemes and Anonymous Credentials from Bilinear Maps}, booktitle = {{Crypto}}, publisher = {Springer}, year = {2004}, number = {3152}, series = {LNCS}, pages = {56--72}, } @InCollection{CL02, author = {Camenisch, Jan and Lysyanskaya, Anna}, title = {A Signature Scheme with Efficient Protocols}, booktitle = {{SCN}}, publisher = {Springer}, year = {2002}, number = {2576}, series = {LNCS}, pages = {268--289}, } @InCollection{CS97, author = {Camenisch, Jan and Stadler, Markus}, title = {Efficient group signature schemes for large groups}, booktitle = {{Crypto}}, publisher = {Springer}, year = {1997}, } @InProceedings{CS99, author = {Cramer, R. and Shoup, V.}, title = {Signature Schemes Based On the Strong RSA Assumption}, booktitle = {{ACM-CCS}}, year = {1999}, publisher = {ACM}, } @InProceedings{FO97, author = {Fujisaki, E. and Okamoto, T.}, title = {Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations}, booktitle = {{Crypto}}, year = {1997}, volume = {1294}, series = {LNCS}, publisher = {Springer}, } @Misc{Inu12, author = {Inutile, Club}, title = {The Password Security Checker}, howpublished = {Website, available at {\url{http://inutile.club/estatis/password-security-checker/}}}, year = {2012}, } @InCollection{LNW15, author = {Ling, San and Nguyen, Khoa and Wang, Huaxiong}, title = {{Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based}}, booktitle = {{PKC}}, publisher = {Springer}, year = {2015}, volume = {9020}, series = {LNCS}, pages = {427--449}, url = {http://dx.doi.org/10.1007/978-3-662-46447-2_19}, } @InProceedings{Lyu12, author = {Lyubashevsky, V.}, title = {Lattice Signatures Without Trapdoors}, booktitle = {{Eurocrypt}}, year = {2012}, volume = {7237}, series = {LNCS}, publisher = {Springer}, } @InProceedings{PSTY13, author = {Charalampos Papamanthou and Elaine Shi and Roberto Tamassia and Ke Yi}, title = {Streaming Authenticated Data Structures}, booktitle = {{Eurocrypt}}, year = {2013}, volume = {7881}, series = {LNCS}, pages = {353--370}, publisher = {Springer}, } @Misc{Pei15, author = {Peikert, Chris}, title = {A Decade of Lattice Cryptography}, howpublished = {Cryptology ePrint Archive: Report 2015/939}, month = sep, year = {2015}, } @InCollection{SSE+12, author = {Sakai, Y. and Schuldt, J. and Emura, K. and Hanaoka, G. and Ohta, K.}, title = {On the Security of Dynamic Group Signatures: Preventing Signature Hijacking}, booktitle = {{PKC}}, publisher = {Springer}, year = {2012}, volume = {7293}, series = {LNCS}, pages = {715--732}, } @InProceedings{ACDN13, author = {Abe, Masayuki and Camenisch, Jan and Dubovitskaya, Maria and Nishimaki, Ryo}, title = {Universally composable adaptive oblivious transfer (with access control) from standard assumptions}, booktitle = {ACM Workshop on Digital Identity Management}, year = {2013}, pages = {1--12}, doi = {10.1145/2517881.2517883}, } @InProceedings{AIR01, author = {William Aiello and Yuval Ishai and Omer Reingold}, title = {Priced oblivious transfer: How to sell digital goods}, booktitle = {Eurocrypt}, year = {2001}, pages = {119--135}, } @InProceedings{AKPW13, author = {Alwen, Jo\"el and Krenn, Stephan and Pietrzak, Krzysztof and Wichs, Daniel}, title = {Learning with Rounding Revisited -- New Reduction, Properties and Applications}, booktitle = {{Crypto}}, year = {2013}, volume = {8042}, series = {LNCS}, pages = {57--74}, organization = {Springer}, } @InProceedings{AWSM07, author = {Man Ho Au and Qianhong Wu and Willy Susilo and Yi Mu}, title = {Compact E-Cash from Bounded Accumulator}, booktitle = {{CT-RSA}'07}, year = {2007}, number = {4377}, series = {LNCS}, pages = {178--195}, } @Misc{Ban15, author = {Banerjee, A.}, title = {New Constructions of Cryptographic Pseudo-Random Functions}, howpublished = {PhD thesis, Georgia Institute of Technology}, month = aug, year = {2015}, } @InProceedings{BBL+14, author = {Banerjee, A. and Brenner, H. and Leurent, G. and Peikert, C. and Rosen, A.}, title = {SPRING: Fast Pseudorandom Functions from Rounded Ring Products}, booktitle = {{FSE}}, year = {2014}, volume = {8540}, series = {LNCS}, pages = {38--57}, } @InProceedings{BP14, author = {Banerjee, Abhishek and Peikert, Chris}, title = {New and Improved Key-Homomorphic Pseudo-Random Functions}, booktitle = {{Crypto}}, year = {2014}, volume = {8616}, series = {LNCS}, pages = {353--370}, organization = {Springer}, } @InProceedings{BPR12, author = {Banerjee, Abhishek and Peikert, Chris and Rosen, Alon}, title = {Pseudo-Random Functions and Lattices}, booktitle = {{Eurocrypt}}, year = {2012}, volume = {7237}, series = {LNCS}, pages = {719--737}, organization = {Springer}, } @InProceedings{BBSU12, author = {Barber, S. and Boyen, X. and Shi, E. and Uzun, E.}, title = {Bitter to Better : How to Make Bitcoin a Better Currency}, booktitle = {{Financial Cryptography}}, year = {2012}, volume = {7397}, series = {LNCS}, pages = {399--414}, } @InProceedings{Bar86, author = {Barrington, D.}, title = {Bounded-Width Polynomial-Size Branching Programs Recognize Exactly Those Languages in NC1}, booktitle = {{STOC}'86}, year = {1986}, pages = {1--5}, } @InProceedings{BCKL08a, author = {Belenkiy, Mira and Chase, Melissa and Kohlweiss, Markulf and Lysyanskaya, Anna}, title = {P-signatures and Noninteractive Anonymous Credentials}, booktitle = {{TCC'08}}, year = {2008}, number = {4948}, series = {LNCS}, pages = {356--374}, publisher = {Springer}, } @InProceedings{BCKL09, author = {Belenkiy, Mira and Chase, Melissa and Kohlweiss, Markulf and Lysyanskaya, Anna}, title = {Compact E-Cash and Simulatable VRFs Revisited}, booktitle = {{Pairing}}, year = {2009}, volume = {5671}, series = {LNCS}, pages = {114--131}, publisher = {Springer}, } @InProceedings{BCG+14, author = {Eli Ben-Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and Ian Miers and Eran Tromer and Madars Virza}, title = {Zerocash: Decentralized Anonymous Payments from Bitcoin}, booktitle = {{IEEE Symposium on Security and Privacy}}, year = {2014}, pages = {459--474}, } @InProceedings{BGM+16, author = {Bogdanov, Andrej and Guo, Siyao and Masny, Daniel and Richelson, Silas and Rosen, Alon}, title = {On the Hardness of Learning With Rounding over Small Modulus}, booktitle = {{TCC}}, year = {2016}, volume = {9562}, series = {LNCS}, pages = {209--224}, } @InProceedings{BGG+14, author = {Boneh, D. and Gentry, C. and Gorbunov, S. and Halevi, S. and Nikolaenko, V. and Segev, G. and Vaikuntanathan, V. and Vinayagamurthy, D.}, title = {Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits}, booktitle = {{Eurocrypt}}, year = {2014}, } @InProceedings{BLMR13, author = {Boneh, Dan and Lewi, Kevin and Montgomery, Hart and Raghunathan, Ananth}, title = {Key-Homomorphic PRFs and their Applications}, booktitle = {{Crypto}}, year = {2013}, volume = {8042}, series = {LNCS}, pages = {410--428}, organization = {Springer}, } @InProceedings{BDPMW16, author = {Bourse, F. and Del Pino, R. and Minelli, M. and Wee, H}, title = {{FHE} Circuit Privacy Almost for Free}, booktitle = {{Crypto}}, year = {2016}, number = {9815}, series = {LNCS}, pages = {62--89}, } @InProceedings{BV11, author = {Brakerski, Z. and Vaikuntanathan, V.}, title = {Efficient Fully Homomorphic Encryption from (Standard) {LWE}}, booktitle = {{FOCS}}, year = {2011}, pages = {97--106}, } @TechReport{Bra93, author = {Brands, S.}, title = {An efficient off-line electronic cash system based on the representation problem}, institution = {Technical Report CS-R9323, CWI}, year = {1993}, } @InProceedings{BCR87, author = {Brassard, Gilles and Cr{\'e}peau, Claude and Robert, Jean-Marc}, title = {All-or-nothing disclosure of secrets.}, booktitle = {{Crypto}}, year = {1987}, volume = {263}, series = {LNCS}, pages = {234--238}, } @InProceedings{CCs08, author = {Camenisch, J. and Chaabouni, R. and shelat, a.}, title = {Efficient Protocols for Set Membership and Range Proofs}, booktitle = {{Asiacrypt}}, year = {2008}, volume = {5350}, series = {LNCS}, pages = {234--252}, } @InProceedings{CD00, author = {Camenisch, J. and Damg{\aa}rd, I.}, title = {Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes}, booktitle = {{Asiacrypt}}, year = {2000}, volume = {1976}, series = {LNCS}, pages = {331--345}, } @InProceedings{CDEN12, author = {Camenisch, J. and Dubovitskaya, M. and Enderlein, R. and Neven, G.}, title = {Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption}, booktitle = {{SCN}}, year = {2012}, volume = {7485}, series = {LNCS}, pages = {559--579}, } @InProceedings{CDN09, author = {Camenisch, J. and Dubovitskaya, M. and Neven, G.}, title = {Oblivious transfer with access control}, booktitle = {{ACM-CCS}}, year = {2009}, pages = {131--140}, } @InProceedings{CDNZ11, author = {Camenisch, J. and Dubovitskaya, M. and Neven, G. and Zaverucha, G.}, title = {Oblivious Transfer with Hidden Access Control Policies}, booktitle = {{PKC}'11}, year = {2011}, volume = {6571}, series = {LNCS}, pages = {192--209}, } @InProceedings{CHL05, author = {Camenisch, Jan and Hohenberger, Susan and Lysyanskaya, Anna}, title = {Balancing Accountability and Privacy Using E-Cash}, booktitle = {{SCN}}, year = {2005}, number = {4116}, series = {LNCS}, pages = {141--155}, } @InProceedings{CL02a, author = {Camenisch, Jan and Lysyanskaya, Anna}, title = {A Signature Scheme with Efficient Protocols}, booktitle = {{Security and Cryptography for Networks} (SCN'02)}, year = {2002}, number = {2576}, series = {LNCS}, pages = {268--289}, } @InProceedings{CL04a, author = {Camenisch, Jan and Lysyanskaya, Anna}, title = {Signature Schemes and Anonymous Credentials from Bilinear Maps}, booktitle = {{Crypto}}, year = {2004}, number = {3152}, series = {LNCS}, pages = {56--72}, } @InProceedings{CLM07, author = {Camenisch, Jan and Lysyanskaya, Anna and Meyerovich, M.}, title = {Endorsed E-Cash}, booktitle = {{IEEE Security \& Privacy }}, year = {2007}, pages = {101--115}, } @InProceedings{CNs07, author = {Camenisch, J. and Neven, G. and shelat, a.}, title = {Simulatable Adaptive Oblivious Transfer}, booktitle = {{Eurocrypt}}, year = {2007}, volume = {4515}, series = {LNCS}, pages = {573--590}, } @InProceedings{CS97a, author = {Camenisch, Jan and Stadler, Markus}, title = {Efficient group signature schemes for large groups}, booktitle = {Crypto'97}, year = {1997}, pages = {410--424}, } @InProceedings{CG07, author = {Canard, S. and Gouget, A.}, title = {Divisible E-Cash Systems Can Be Truly Anonymous}, booktitle = {{Eurocrypt}}, year = {2007}, volume = {4515}, series = {LNCS}, pages = {482--497}, } @InProceedings{CG08a, author = {Canard, S. and Gouget, A.}, title = {Anonymity in Transferable E-cash}, booktitle = {{ACNS}}, year = {2008}, volume = {5037}, series = {LNCS}, pages = {207--223}, } @InProceedings{CG10, author = {Canard, S. and Gouget, A.}, title = {Multiple Denominations in E-cash with Compact Transaction Data}, booktitle = {{Financial Cryptography}}, year = {2010}, volume = {6052}, series = {LNCS}, pages = {82--97}, } @InProceedings{CGT08, author = {Canard, S. and Gouget, A. and Traor\'e, J.}, title = {Improvement of Efficiency in (Unconditional) Anonymous Transferable E-Cash}, booktitle = {{Financial Cryptography}}, year = {2008}, volume = {5143}, series = {LNCS}, pages = {202--214}, } @InProceedings{CPST15, author = {Canard, S. and Pointcheval, D. and Sanders, O. and Traor\'e, J.}, title = {Divisible E-Cash Made Practical}, booktitle = {{PKC}}, year = {2015}, volume = {9020}, series = {LNCS}, pages = {77--100}, } @InProceedings{CPST15a, author = {Canard, S. and Pointcheval, D. and Sanders, O. and Traor\'e, J.}, title = {Scalable Divisible E-cash}, booktitle = {{ACNS}}, year = {2015}, volume = {9092}, series = {LNCS}, pages = {287--306}, } @Article{Can00, author = {Canetti, Ran}, title = {Security and composition of multi-party cryptographic protocols}, year = {2000}, volume = {13}, number = {1}, pages = {143--202}, journaltitle = {Journal of Cryptology}, } @InProceedings{Can01, author = {Canetti, R.}, title = {Universally Composable Security: A New Paradigm for Cryptographic Protocols}, booktitle = {{FOCS}}, year = {2001}, pages = {136--145}, } @InProceedings{CFT98, author = {Chan, A. and Frankel, Y. and Tsiounis, Y.}, title = {Easy come, easy go divisible cash}, booktitle = {{Eurocrypt}}, year = {1998}, volume = {1403}, series = {LNCS}, pages = {561--575}, publisher = {Springer}, } @InProceedings{Cha82, author = {Chaum, D.}, title = {Blind Signatures for Untraceable Payments}, booktitle = {{Crypto}}, year = {1982}, series = {LNCS}, pages = {199--203}, } @InProceedings{Cha83, author = {Chaum, D.}, title = {Blind Signature System}, booktitle = {{Crypto}}, year = {1983}, series = {LNCS}, pages = {153}, } @InProceedings{Cha89, author = {Chaum, D.}, title = {On-line Cash Checks}, booktitle = {{Eurocrypt}}, year = {1989}, volume = {434}, series = {LNCS}, pages = {2893293}, } @InProceedings{CFN88, author = {Chaum, D. and Fiat, A. and Naor, M.}, title = {Untraceable electronic cash}, booktitle = {{Crypto}}, year = {1988}, volume = {403}, series = {LNCS}, pages = {319--327}, } @InProceedings{CP92, author = {Chaum, D. and Pedersen, T.}, title = {Transferred Cash Grows in Size}, booktitle = {{Eurocrypt}}, year = {1992}, volume = {658}, series = {LNCS}, pages = {390--407}, } @InProceedings{CGKS95, author = {Chor, B. and Goldreich, O. and Kushilevitz, E. and Sudan, M.}, title = {Private Information Retrieval}, booktitle = {{FOCS}}, year = {1995}, pages = {41--50}, } @InProceedings{Chu05, author = {Chu, C.-K. ad Tzeng, W.-G.}, title = {Efficient k-out-of-n Oblivious Transfer Schemes With Adaptive and Non-Adaptive Queries}, booktitle = {{PKC}}, year = {2005}, number = {3386}, series = {LNCS}, pages = {172--183}, } @InProceedings{CGH09, author = {Coull, S. and Green, M. and Hohenberger, S.}, title = {Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials}, booktitle = {{PKC}}, year = {2009}, number = {5443}, series = {LNCS}, } @InProceedings{CD09, author = {Cramer, Ronald and Damg{\aa}rd, Ivan}, title = {On the Amortized Complexity of Zero-Knowledge Protocols}, booktitle = {{Crypto}}, year = {2009}, volume = {5677}, series = {LNCS}, pages = {177--191}, __markedentry = {[fmouhart:]}, } @InProceedings{CK88, author = {Cr{\'e}peau, Claude and Kilian, Joe}, title = {Weakening security assumptions and Oblivious Transfer}, booktitle = {Crypto}, year = {1988}, pages = {2--7}, } @InProceedings{DDC94, author = {D'Amiano, S. and Di Crescenzo, G.}, title = {Methodology for Digital Money based on General Cryptographic Tools}, booktitle = {{Eurocrypt}}, year = {1994}, volume = {950}, series = {LNCS}, pages = {156--170}, } @InProceedings{DN03, author = {Damg{\aa}rd, I. and Nielsen, J.-B.}, title = {Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption}, booktitle = {{Crypto}}, year = {2003}, number = {2729}, series = {LNCS}, pages = {247--264}, } @InProceedings{DCOR99, author = {Di Crescenzo, G. and Ostrovsky, R. and Rajagopalan, S.}, title = {Conditional oblivious transfer and timed-release encryption}, booktitle = {{Eurocrypt}'99}, year = {1999}, number = {1592}, series = {LNCS}, pages = {74--89}, } @InProceedings{Dod03, author = {Dodis, Y.}, title = {Efficient Construction of (Distributed) Verifiable Random Functions}, booktitle = {{PKC}}, year = {2003}, volume = {2567}, series = {LNCS}, pages = {1--17}, } @InProceedings{DY05, author = {Dodis, Y. and Yampolskiy, A.}, title = {A Verifiable Random Function with Short Proofs and Keys}, booktitle = {{PKC}}, year = {2005}, number = {3386}, series = {LNCS}, pages = {416--431}, } @InProceedings{DFKS16, author = {D\"ottling, N. and Fleischhacker, N. and Krupp, J. and Schr\"oder, D.}, title = {Two-Message, Oblivious Evaluation of Cryptographic Functionalities}, booktitle = {{Crypto}}, year = {2016}, number = {9816}, series = {LNCS}, pages = {619--648}, } @InProceedings{DS15, author = {D\"ottling, N. and Schr\"oder, D.}, title = {Efficient Pseudorandom Functions via On-the-Fly Adaptation}, booktitle = {{Crypto}}, year = {2015}, volume = {9215}, series = {LNCS}, pages = {329--350}, } @InProceedings{DS16, author = {Ducas, L. and Stehl\'e, D.}, title = {Sanitization of {FHE} Ciphertexts}, booktitle = {{Eurocrypt}}, year = {2016}, series = {LNCS}, note = {Cryptology ePrint Archive: Report 2016/164}, } @Article{EGL85, author = {Even, S. and Goldreich, O. and Lempel, A.}, title = {A Randomized Protocol for Signing Contracts}, year = {1985}, volume = {28}, number = {6}, pages = {637--647}, journaltitle = {Communications of the {ACM}}, } @InProceedings{FTY96, author = {Frankel, Y. and Tsiounis, Y. and Yung, M.}, title = {"Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash}, booktitle = {{Asiacrypt}}, year = {1996}, volume = {1163}, series = {LNCS}, pages = {286--300}, publisher = {Springer}, } @InProceedings{FY93, author = {Franklin, M. and Yung, M.}, title = {Secure and Efficient Off-Line Digital Money}, booktitle = {{ICALP}}, year = {1993}, volume = {700}, series = {LNCS}, pages = {265--276}, publisher = {Springer}, } @InProceedings{FIPR05, author = {Freedman, M. and Ishai, Y. and Pinkas, B. and Reingold, O.}, title = {Keyword Search and Oblivious Pseudorandom Functions}, booktitle = {{TCC}}, year = {2005}, volume = {3378}, series = {LNCS}, pages = {303--324}, } @InProceedings{FPV09, author = {Fuchsbauer, G. and Pointcheval, D. and Vergnaud, D.}, title = {Transferable Constant-Size Fair E-Cash}, booktitle = {{CANS}}, year = {2009}, volume = {5888}, series = {LNCS}, pages = {226--247}, } @InProceedings{GSW13, author = {Gentry, C. and Sahai, A. and Waters, B.}, title = {Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based}, booktitle = {{Crypto}}, year = {2013}, number = {8042}, series = {LNCS}, pages = {75--92}, } @InProceedings{GGM86, author = {Goldreich, O. and Goldwasser, S. and Micali, S.}, title = {How to construct random functions}, booktitle = {J. of {ACM}}, year = {1986}, volume = {33}, number = {4}, pages = {792--807}, } @InProceedings{GMW87, author = {Goldreich, Oded and Micali, Silvio and Wigderson, Avi}, title = {How to play any mental game or a completeness theorem for protocols with honest majority}, booktitle = {STOC}, year = {1987}, pages = {218--229}, } @InProceedings{GV15, author = {Gorbunov, S. and Vinayagamurthy, D.}, title = {Riding on Asymmetry: Efficient ABE for Branching Programs}, booktitle = {{Asiacrypt}}, year = {2015}, } @InProceedings{GH07, author = {Green, M. and Hohenberger, S.}, title = {Blind Identity-Based Encryption and Simulatable Oblivious Transfer}, booktitle = {{Asiacrypt}}, year = {2007}, volume = {4833}, series = {LNCS}, pages = {265--282}, } @InProceedings{GH11, author = {Green, M. and Hohenberger, S.}, title = {Practical Adaptive Oblivious Transfer from Simple Assumptions}, booktitle = {{TCC}}, year = {2011}, volume = {6597}, series = {LNCS}, pages = {347--363}, } @Article{Her11, author = {Herranz, J.}, title = {Restricted Adaptive Oblivious Transfer}, year = {2011}, volume = {412}, number = {46}, pages = {6498--6506}, journaltitle = {Theoretical Computer Science}, } @InProceedings{HAO15, author = {Hiromasa, R. and Abe, M. and Okamoto, T.}, title = {Packing Messages and Optimizing Bootstrapping in {GSW-FHE}}, booktitle = {{PKC}}, year = {2015}, number = {9020}, series = {LNCS}, pages = {699--715}, chapter = {Hiromasa, R. and Abe, M. and Okamoto, T.}, } @Misc{Inu12a, author = {Inutile, Club}, title = {The Password Security Checker}, howpublished = {Website, available at {\url{http://inutile.club/estatis/password-security-checker/}}}, year = {2012}, } @InProceedings{IP07, author = {Yuval Ishai and Anat Paskin}, title = {Evaluating Branching Programs on Encrypted Data}, booktitle = {{TCC}}, year = {2007}, } @InProceedings{JL09, author = {Jarecki, S. and Liu, X.}, title = {Efficient Oblivious Pseudorandom Function with Applications to Adaptive {OT} and Secure Computation of Set Intersection}, booktitle = {{TCC}}, year = {2009}, volume = {5444}, series = {LNCS}, pages = {577--594}, } @InProceedings{JS07, author = {Jarecki, S. and Shmatikov, V.}, title = {Efficient Two-Party Secure Computation on Committed Inputs}, booktitle = {{Eurocrypt}}, year = {2007}, volume = {4515}, series = {LNCS}, pages = {97--114}, } @InProceedings{Kil88, author = {Kilian, J.}, title = {Founding Cryptography on Oblivious Transfer}, booktitle = {{STOC}}, year = {1988}, } @InProceedings{KP06, author = {Kunz-Jacques, S{\'{e}}bastien and Pointcheval, David}, title = {About the security of {MTI/C0} and {MQV}}, booktitle = {SCN'06}, year = {2006}, editor = {Springer}, pages = {156--172}, } @InProceedings{KN09, author = {Kurosawa, K. and Nojima, R.}, title = {Simple Adaptive Oblivious Transfer Without Random Oracle}, booktitle = {{Asiacrypt}}, year = {2009}, volume = {5912}, series = {LNCS}, pages = {334--346}, } @InProceedings{KPN10, author = {Kurosawa, K. and Phong, L. and Nojima, R.}, title = {Efficiency-Improved Fully Simulatable Adaptive {OT} under the {DDH} Assumption}, booktitle = {{SCN}}, year = {2010}, volume = {6280}, series = {LNCS}, pages = {172--181}, } @InProceedings{KPN11, author = {Kurosawa, K. and Phong, L. and Nojima, R.}, title = {Generic Fully Simulatable Adaptive Oblivious Transfer}, booktitle = {{ACNS}}, year = {2011}, volume = {6715}, series = {LNCS}, pages = {274--291}, } @InProceedings{LOS+10, author = {Lewko, A. and Okamoto, T. and Sahai, A. and Takashima, K. and Waters, B.}, title = {Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption}, booktitle = {{Eurocrypt}}, year = {2010}, number = {6110}, series = {LNCS}, } @InProceedings{LLM+16, author = {Libert, B. and Ling, S. and Mouhartem, F. and Nguyen, K. and Wang, H.}, title = {Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions}, booktitle = {{Asiacrypt}}, year = {2016}, url = {http://ia.cr/2016/101}, } @InProceedings{LLM+16a, author = {Libert, B. and Ling, S. and Mouhartem, F. and Nguyen, K. and Wang, H.}, title = {Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption}, booktitle = {{Asiacrypt}}, year = {2016}, url = {https://ia.cr/2016/879}, } @Article{Lin08, author = {Lindell, Andrew Y.}, title = {Efficient Fully-Simulatable Oblivious Transfer}, year = {2008}, journaltitle = {CT-RSA}, series = {LNCS}, } @InProceedings{LNW15a, author = {Ling, San and Nguyen, Khoa and Wang, Huaxiong}, title = {Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based}, booktitle = {PKC}, year = {2015}, volume = {9020}, series = {LNCS}, pages = {427--449}, doi = {10.1007/978-3-662-46447-2_19}, isbn = {978-3-662-46446-5}, language = {English}, url = {http://dx.doi.org/10.1007/978-3-662-46447-2_19}, } @Article{Lip08, author = {Helger Lipmaa}, title = {Private Branching Programs: On Communication-Efficient Cryptocomputing}, year = {2008}, volume = {2008}, pages = {107}, bibsource = {dblp computer science bibliography, http://dblp.org}, biburl = {http://dblp.uni-trier.de/rec/bib/journals/iacr/Lipmaa08}, journaltitle = {{IACR} Cryptology ePrint Archive}, url = {https://ia.cr/2008/107}, } @InProceedings{Mer89, author = {Ralph C. Merkle}, title = {{A Certified Digital Signature}}, booktitle = {{Crypto}}, year = {1989}, } @InProceedings{MRV99, author = {Micali, S. and Rabin, M. and Vadhan, S.}, title = {Verifiable Random Functions}, booktitle = {FOCS}, year = {1999}, pages = {120--130}, } @InProceedings{MS95, author = {Micali, S. and Sidney, R.}, title = {A simple method for generating and sharing pseudo-random functions}, booktitle = {{Crypto}}, year = {1995}, volume = {963}, series = {LNCS}, pages = {185196}, } @InProceedings{MGGR13, author = {Miers, I. and Garman, C. and Green, M. and Rubin, A.}, title = {Zerocoin: Anonymous Distributed E-Cash from Bitcoin}, booktitle = {{IEEE Security \& Privacy}}, year = {2013}, pages = {397--411}, } @InProceedings{MW16, author = {Mukherjee, P. and Wichs, D.}, title = {Two Round Mutliparty Computation via Multi-Key FHE}, booktitle = {{Eurocrypt}}, year = {2016}, series = {LNCS}, note = {To appear}, } @Misc{Nak, author = {Nakamoto, S.}, title = {Bitcoin: A peer-to-peer electronic cash system}, howpublished = {\url{www.bitcoin.org}}, } @InProceedings{NP01, author = {Naor, Moni and Pinkas, Benny}, title = {Efficient oblivious transfer protocols.}, booktitle = {SODA}, year = {2001}, pages = {448--457}, } @Article{NP05, author = {Naor, M. and Pinkas, B.}, title = {Computationally Secure Oblivious Transfer}, year = {2005}, volume = {18}, number = {1}, pages = {1--35}, journaltitle = {Journal of Cryptology}, } @InProceedings{NP99, author = {Naor, M. and Pinkas, B.}, title = {Oblivious transfer with adaptive queries}, booktitle = {{Crypto}}, year = {1999}, volume = {1666}, series = {LNCS}, pages = {573--590}, } @InProceedings{NPR99, author = {Naor, M. and Pinkas, B. and Reingold, O.}, title = {Distributed Pseudo-random Functions and KDCs}, booktitle = {{Eurocrypt}}, year = {1999}, volume = {1592}, series = {LNCS}, pages = {327--346}, } @Article{NR04, author = {Naor, M. and Reingold, O.}, title = {Number-theoretic constructions of efficient pseudo-random functions}, year = {2004}, volume = {51}, pages = {231--262}, journaltitle = {Journal of the ACM}, } @InProceedings{NYO08, author = {Nishide, T. and Yoneyama, K. and Ohta, K.}, title = {Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures}, booktitle = {{ACNS}'08}, year = {2008}, number = {5037}, series = {LNCS}, pages = {111--129}, } @InProceedings{OO89, author = {Ohta, K. and Okamoto, T.}, title = {Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash}, booktitle = {{Crypto}}, year = {1989}, volume = {435}, series = {LNCS}, pages = {481--496}, } @InProceedings{OO91, author = {Ohta, K. and Okamoto, T.}, title = {Universal Electronic Cash}, booktitle = {{Crypto}}, year = {1991}, volume = {576}, series = {LNCS}, pages = {324--337}, publisher = {Springer}, } @InProceedings{Oka95, author = {Okamoto, T.}, title = {An Efficient Divisible Electronic Cash Scheme}, booktitle = {{Crypto}}, year = {1995}, volume = {963}, series = {LNCS}, pages = {438--451}, publisher = {Springer}, } @InProceedings{Pai92, author = {Pailles, J.-C.}, title = {New Protocols for Electronic Money}, booktitle = {{Auscrypt}}, year = {1992}, volume = {718}, series = {LNCS}, pages = {263--274}, publisher = {Springer}, } @Misc{Pei15a, author = {Peikert, Chris}, title = {A Decade of Lattice Cryptography}, howpublished = {Cryptology ePrint Archive: Report 2015/939}, month = sep, year = {2015}, } @InProceedings{PVW08, author = {Peikert, C. and Vaikuntanathan, V. and Waters, B.}, title = {A Framework for Efficient and Composable Oblivious Transfer}, booktitle = {{Crypto}}, year = {2008}, volume = {5157}, series = {LNCS}, pages = {554--571}, } @Misc{Rab81, author = {Rabin, M.}, title = {How to exchange secrets by oblivious transfer}, howpublished = {Technical Report TR-81, Aiken Computation Laboratory, Harvard University}, year = {1981}, } @Article{Reg09, author = {Oded Regev}, title = {{On Lattices, Learning with Errors, Random Linear Codes, and Cryptography}}, year = {2009}, volume = {56}, number = {6}, bibsource = {DBLP, http://dblp.uni-trier.de}, ee = {http://doi.acm.org/10.1145/1568318.1568324}, journaltitle = {Journal of the ACM}, } @InProceedings{RKP09, author = {Alfredo Rial and Markulf Kohlweiss and Bart Preneel}, title = {Universally composable adaptive priced oblivious transfer}, booktitle = {Pairing'09}, year = {2009}, editor = {Springer}, series = {LNCS}, pages = {231--247}, } @InProceedings{Rue10, author = {R\"uckert, M.}, title = {Lattice-Based Blind Signatures}, booktitle = {{Asiacrypt}}, year = {2010}, volume = {6477}, series = {LNCS}, pages = {413--430}, } @InProceedings{SW05, author = {Sahai, A. and Waters, B.}, title = {Fuzzy Identity-Based Encryption}, booktitle = {{Eurocrypt}}, year = {2005}, number = {3494}, series = {LNCS}, pages = {457--473}, } @InProceedings{SSE+12a, author = {Sakai, Y. and Schuldt, J. and Emura, K. and Hanaoka, G. and Ohta, K.}, title = {On the Security of Dynamic Group Signatures: Preventing Signature Hijacking}, booktitle = {PKC}, year = {2012}, volume = {7293}, series = {LNCS}, pages = {715--732}, edition = {Springer}, } @Article{vSN92, author = {von Solms, S. and Naccache, D.}, title = {On blind signatures and perfect crimes}, year = {1992}, volume = {11}, pages = {581583}, journaltitle = {Computers \& Security}, } @InProceedings{Tau05, author = {Tauman-Kalai, Y.}, title = {Smooth Projective Hashing and Two-Message Oblivious Transfer}, booktitle = {{Eurocrypt}'05}, year = {2005}, number = {3494}, series = {LNCS}, pages = {78--95}, publisher = {Springer}, } @PhdThesis{Tsi97, author = {Tsiounis, Y.}, title = {Efficient Electronic Cash: New Notions and Techniques}, year = {1997}, howpublished = {PhD thesis, Northeastern University}, institution = {Northeastern University}, } @InProceedings{ZAW+10, author = {Zhang, Y. and Au, M.-H. and Wong, D. and Huang, Q. and Mamoulis, N. and Cheung, D. and Yiu, S.-M.}, title = {Oblivious Transfer with Access Control: Realizing Disjunction without Duplication}, booktitle = {{Pairing}}, year = {2010}, number = {6847}, series = {LNCS}, pages = {96--115}, } @InProceedings{ACD+12, author = {Masayuki Abe and Melissa Chase and Bernardo David and Markulf Kohlweiss and Ryo Nishimaki and Miyako Ohkubo}, title = {Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions}, booktitle = {{Asiacrypt}}, year = {2012}, volume = {7658}, number = {7658}, series = {LNCS}, pages = {4--24}, publisher = {Springer}, } @InProceedings{AFG+10, author = {Masayuki Abe and Georg Fuchsbauer and Jens Groth and Kristiyan Haralambiev and Miyako Ohkubo}, title = {Structure-Preserving Signatures and Commitments to Group Elements}, booktitle = {{Crypto}}, year = {2010}, volume = {6223}, number = {6223}, series = {LNCS}, pages = {209--236}, publisher = {Springer}, } @InProceedings{ABB10, author = {Agrawal, S. and Boneh, D. and Boyen, X.}, title = {Efficient Lattice {(H)IBE} in the Standard Model}, booktitle = {{Eurocrypt}}, year = {2010}, volume = {6110}, series = {LNCS}, pages = {553--572}, publisher = {Springer}, } @InProceedings{ABB+13, author = {Carlos Aguilar-Melchor and Slim Bettaieb and Xavier Boyen and Laurent Fousse and Philippe Gaborit}, title = {Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting}, booktitle = {{Africacrypt}}, year = {2013}, volume = {7918}, series = {LNCS}, pages = {1--25}, publisher = {Springer}, } @InProceedings{AP09, author = {Alwen, J. and Peikert, C.}, title = {Generating shorter bases for hard random lattices}, booktitle = {{STACS}}, year = {2009}, volume = {3}, series = {LNCS}, pages = {75--86}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany}, } @InProceedings{AJL+12, author = {Asharov, G. and Jain, A. and Lopez-Alt, A. and Tromer, E. and Vaikuntanathan, V. and Wichs, D.}, title = {Multiparty Computation with Low Communication, Computation and Interaction via Threshold {FHE}}, booktitle = {Eurocrypt}, year = {2012}, volume = {7237}, series = {LNCS}, pages = {483--501}, publisher = {Springer}, } @InProceedings{ACJT00, author = {Ateniese, Giuseppe and Camenisch, Jan and Joye, Marc and Tsudik, Gene}, title = {A practical and provably secure coalition-resistant group signature scheme}, booktitle = {Crypto}, year = {2000}, volume = {1880}, series = {LNCS}, pages = {255--270}, organization = {Springer}, publisher = {Springer}, } @InProceedings{AT99, author = {Ateniese, Giuseppe and Tsudik, Gene}, title = {Some open issues and new directions in group signatures}, booktitle = {Financial Cryptography}, year = {1999}, pages = {196--211}, organization = {Springer}, } @Article{BHJ+15, author = {B{\"o}hl, Florian and Hofheinz, Dennis and Jager, Tibor and Koch, Jessica and Striecks, Christoph}, title = {Confined guessing: New signatures from standard assumptions}, journal = {Journal of Cryptology}, year = {2015}, volume = {28}, number = {1}, pages = {176--208}, journaltitle = {Journal of Cryptology}, publisher = {Springer}, } @InProceedings{BLL+15, author = {Bai, Shi and Langlois, Adeline and Lepoint, Tancr\`ede and Stehl\'e, Damien and Steinfeld, Ron}, title = {Improved Security Proofs in Lattice-Based Cryptography: Using the {R\'enyi} Divergence Rather Than the Statistical Distance}, booktitle = {{Asiacrypt}}, year = {2015}, volume = {9452}, series = {LNCS}, publisher = {Springer}, } @Article{Ban93, author = {Banaszczyk, W.}, title = {New bounds in some transference theorems in the geometry of number}, year = {1993}, volume = {296}, pages = {625--635}, eid = {Springer}, journaltitle = {Mathematische Annalen}, } @InProceedings{BP97, author = {Niko Baric and Birgit Pfitzmann}, title = {{Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees}}, booktitle = {{Eurocrypt}}, year = {1997}, volume = {1233}, series = {LNCS}, pages = {480--494}, publisher = {Springer}, } @InProceedings{BCC+09, author = {Mira Belenkiy and Jan Camenisch and Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Hovav Shacham}, title = {Randomizable Proofs and Delegatable Anonymous Credentials}, booktitle = {{Crypto}}, year = {2009}, volume = {5677}, series = {LNCS}, pages = {108--125}, publisher = {Springer}, } @InProceedings{BMW03, author = {Bellare, Mihir and Micciancio, Daniele and Warinschi, Bogdan}, title = {Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions}, booktitle = {{Eurocrypt}}, year = {2003}, volume = {3376}, number = {2656}, series = {LNCS}, pages = {614--629}, publisher = {Springer}, } @InProceedings{BSZ05, author = {Bellare, Mihir and Shi, Haixia and Zhang, Chong}, title = {Foundations of group signatures: The case of dynamic groups}, booktitle = {{CT-RSA}}, year = {2005}, volume = {2656}, number = {3376}, series = {LNCS}, pages = {136--153}, publisher = {Springer}, } @InProceedings{BCK+14, author = {Benhamouda, Fabrice and Camenisch, Jan and Krenn, Stephan and Lyubashevsky, Vadim and Neven, Gregory}, title = {Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures}, booktitle = {{Asiacrypt}}, year = {2014}, number = {8873}, series = {LNCS}, pages = {551--572}, publisher = Springer, } @InProceedings{BKLP15, author = {Fabrice Benhamouda and Stephan Krenn and Vadim Lyubashevsky and Krzysztof Pietrzak}, title = {Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings}, booktitle = {{ESORICS}}, year = {2015}, volume = {9326}, series = {LNCS}, pages = {305--325}, publisher = {Springer}, note = {to appear}, } @Article{BKLP14, author = {Fabrice Benhamouda and Stephan Krenn and Vadim Lyubashevsky and Krzysztof Pietrzak}, title = {{Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings}}, year = {2014}, volume = {2014}, pages = {889}, journaltitle = {{IACR} Cryptology ePrint Archive}, url = {https://ia.cr/2014/889}, } @InProceedings{BB04, author = {D. Boneh and X. Boyen}, title = {Efficient Selective-{ID} Secure Identity-Based Encryption Without Random Oracles}, booktitle = {{E}urocrypt}, year = {2004}, volume = {3027}, series = {LNCS}, pages = {223--238}, publisher = {Springer}, } @InProceedings{BBS04, author = {Boneh, Dan and Boyen, Xavier and Shacham, Hovav}, title = {Short group signatures}, booktitle = {{Crypto}}, year = {2004}, volume = {3152}, series = {LNCS}, pages = {41--55}, organization = {Springer}, } @InProceedings{BS04, author = {Boneh, Dan and Shacham, Hovav}, title = {Group signatures with verifier-local revocation}, booktitle = {{ACM-CCS}}, year = {2004}, pages = {168--177}, organization = {ACM}, } @InProceedings{Boy10, author = {Boyen, Xavier}, title = {Lattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more}, booktitle = {{PKC}}, year = {2010}, volume = {6056}, series = {LNCS}, pages = {499--517}, publisher = {Springer}, } @InProceedings{BW07, author = {X. Boyen and B. Waters}, title = {Full-Domain Subgroup Hiding and Constant-Size Group Signatures}, booktitle = {{PKC}}, year = {2007}, volume = {4450}, series = {LNCS}, pages = {1--15}, publisher = {Springer}, } @InProceedings{BW06, author = {X. Boyen and B. Waters}, title = {Compact Group Signatures Without Random Oracles}, booktitle = {{E}urocrypt}, year = {2006}, volume = {4004}, series = {LNCS}, pages = {427--444}, publisher = {Springer}, } @Article{BK10, author = {Zvika Brakerski and Yael Tauman Kalai}, title = {A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model}, year = {2010}, volume = {2010}, pages = {86}, bibsource = {DBLP, http://dblp.uni-trier.de}, ee = {https://ia.cr/2010/086}, journaltitle = {IACR Cryptology ePrint Archive}, } @InProceedings{BLP+13, author = {Brakerski, Z. and Langlois, A. and Peikert, C. and Regev, O. and Stehl{\'e}, D.}, title = {On the classical hardness of learning with errors}, booktitle = {{STOC}}, year = {2013}, pages = {575--584}, publisher = {ACM}, } @InProceedings{BPVY00, author = {Brickell, E. and Pointcheval, D. and Vaudenay, S. and Yung, M.}, title = {Design Validations for Discrete Logarithm Based Signature Schemes}, booktitle = {{PKC}}, year = {2000}, volume = {1751}, series = {LNCS}, pages = {276--292}, publisher = {Springer}, } @InProceedings{CDHK15, author = {Camenisch, J. and Dubovitskaya, M. and Haralambiev, K. and Kohlweiss, M.}, title = {Composable and Modular Anonymous Credentials: Definitions and Practical Constructions}, booktitle = {{Asiacrypt}}, year = {2015}, series = {LNCS}, publisher = {Springer}, url = {https://ia.cr/2015/580}, } @InProceedings{CG08, author = {Camenisch, Jan and Gross, Thomas}, title = {Efficient attributes for anonymous credentials}, booktitle = {{ACM-CCS}}, year = {2008}, pages = {345--356}, publisher = {ACM}, } @InProceedings{CHL05a, author = {Camenisch, Jan and Hohenberger, Susan and Lysyanskaya, Anna}, title = {Compact e-cash}, booktitle = {{Eurocrypt}}, year = {2005}, number = {3494}, series = {LNCS}, pages = {302--321}, publisher = {Springer}, } @InProceedings{CKY09, author = {Camenisch, Jan and Kiayias, Aggelos and Yung, Moti}, title = {On the Portability of Generalized {Schnorr} Proofs}, booktitle = {{Eurocrypt}}, year = {2009}, number = {5479}, series = {LNCS}, pages = {425--442}, publisher = {Springer}, } @InProceedings{CKL+15, author = {Camenisch, J. and Krenn, S. and Lehmann, A. and Mikkelsen, G.-L. and Neven, G. and Pedersen, M.-0.}, title = {Formal Treatment of Privacy-Enhancing Credential Systems}, booktitle = {{SAC}}, year = {2015}, series = {LNCS}, pages = {3--24}, publisher = {Springer}, url = {https://ia.cr/2014/708}, } @InProceedings{CL02b, author = {Jan Camenisch and Anna Lysyanskaya}, title = {Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials}, booktitle = {{Crypto}}, year = {2002}, volume = {2442}, series = {LNCS}, pages = {61--76}, publisher = {Springer}, } @InProceedings{CL01, author = {Camenisch, Jan and Lysyanskaya, Anna}, title = {An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation}, booktitle = {{Eurocrypt}}, year = {2001}, number = {2045}, series = {LNCS}, pages = {93--118}, publisher = {Springer}, } @InProceedings{CNR12, author = {J. Camenisch and G. Neven and M. R{\"u}ckert}, title = {Fully Anonymous Attribute Tokens from Lattices}, booktitle = {{SCN}}, year = {2012}, volume = {7485}, series = {LNCS}, pages = {57--75}, publisher = {Springer}, } @InProceedings{CHKP10, author = {Cash, D. and Hofheinz, D. and Kiltz, E. and Peikert, C.}, title = {Bonsai Trees, or How to Delegate a Lattice Basis}, booktitle = {{Eurocrypt}}, year = {2010}, volume = {6110}, series = {LNCS}, pages = {523--552}, publisher = {Springer}, } @InProceedings{CLY09, author = {Julien Cathalo and Beno\^it Libert and Moti Yung}, title = {Group Encryption: Non-Interactive Realization in the Standard Model}, booktitle = {{Asiacrypt}}, year = {2009}, number = {5912}, series = {LNCS}, pages = {179--196}, publisher = {Springer}, } @InProceedings{CMZ14, author = {Melissa Chase and Sarah Meiklejohn and Greg Zaverucha}, title = {Algebraic MACs and Keyed-Verification Anonymous Credentials}, booktitle = {{ACM-CCS}}, year = {2014}, pages = {1205--1216}, publisher = {ACM}, } @Article{Cha85, author = {Chaum, David}, title = {Security without Identification: Transactions ssystem to make big brother obsolete}, year = {1985}, volume = {28}, number = {10}, pages = {1030--1044}, journaltitle = {Communications of the {ACM}}, } @InProceedings{CVH91, author = {Chaum, David and Van Heyst, Eug{\`e}ne}, title = {Group signatures}, booktitle = {{Eurocrypt}}, year = {1991}, volume = {547}, series = {LNCS}, pages = {257--265}, organization = {Springer}, publisher = {Springer}, } @InProceedings{CVH91a, author = {Chaum, David and Van Heyst, Eug{\`e}ne}, title = {Group signatures}, booktitle = {{Eurocrypt}}, year = {1991}, volume = {547}, series = {LNCS}, pages = {257--265}, organization = {Springer}, publisher = {Springer}, } @InProceedings{Dam00, author = {Damg{\aa}rd, I.}, title = {Efficient Concurrent Zero-Knowledge in the Auxiliary String Model}, booktitle = {{Eurocrypt}}, year = {2000}, volume = {1807}, series = {LNCS}, pages = {418--430}, publisher = {Springer}, edition = {Springer}, } @InProceedings{DHKT08, author = {Damg{\aa}rd, I. and Hofheinz, D. and Kiltz, E. and Thorbek, R.}, title = {Public-key encryption with non-interactive opening}, booktitle = {{CT-RSA}}, year = {2008}, volume = {4964}, series = {LNCS}, pages = {239--255}, publisher = {Springer}, edition = {Springer}, } @InProceedings{DT07, author = {Damg{\aa}rd, I. and Thorbek, R.}, title = {Non-interactive Proofs for Integer Multiplication}, booktitle = {{Eurocrypt}}, year = {2007}, volume = {4515}, series = {LNCS}, pages = {412--429}, publisher = {Springer}, edition = {Springer}, } @InProceedings{DP06, author = {Delerabl{\'e}e, C{\'e}cile and Pointcheval, David}, title = {Dynamic fully anonymous short group signatures}, booktitle = {VietCrypt}, year = {2006}, volume = {4341}, number = {4341}, series = {LNCS}, pages = {193--210}, publisher = {Springer}, } @Article{DZ09, author = {Delgrossi, Luca and Zhang, Tao}, title = {Dedicated Short-Range Communications}, year = {2009}, pages = {44--51}, journaltitle = {Vehicle Safety Communications: Protocols, Security, and Privacy}, publisher = {Wiley Online Library}, } @InProceedings{ELL+15, author = {Martianus Frederic Ezerman and Hyung Tae Lee and San Ling and Khoa Nguyen and Huaxiong Wang}, title = {A Provably Secure Group Signature Scheme from Code-Based Assumptions}, booktitle = {{Asiacrypt}'15}, year = {2015}, volume = {9452}, series = {LNCS}, pages = {260--285}, publisher = {Springer}, howpublished = {Cryptology ePrint Archive, Report 2015/479}, } @InProceedings{FS86, author = {Fiat, Amos and Shamir, Adi}, title = {How To Prove Yourself: Practical Solutions to Identification and Signature Problems}, booktitle = {Crypto}, year = {1986}, editor = {Odlyzko, Andrew M.}, pages = {186--194}, publisher = {Springer}, isbn = {978-3-540-47721-1}, } @InProceedings{GLF+10, author = {Galindo, D. and Libert, B. and Fischlin, M. and Fuchsbauer, G. and Lehmann, A. and Manulis, M. and Schr\"oder, D.}, title = {Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions}, booktitle = {{Africacrypt}}, year = {2010}, volume = {6055}, series = {LNCS}, pages = {333--350}, publisher = {Springer}, edition = Springer, } @InProceedings{Gen09, author = {Gentry, C.}, title = {Fully homomorphic encryption using ideal lattices}, booktitle = {{STOC}}, year = {2009}, pages = {169--178}, publisher = {ACM}, } @InProceedings{GPV08, author = {Gentry, C. and Peikert, C. and Vaikuntanathan, V.}, title = {Trapdoors for hard lattices and new cryptographic constructions}, booktitle = {{STOC}}, year = {2008}, pages = {197--206}, publisher = {{ACM}}, } @InProceedings{GMR85, author = {Goldwasser, Shafi and Micali, Silvio and Rackoff, Charles}, title = {The knowledge complexity of interactive proof-systems}, booktitle = {{STOC}}, year = {1985}, pages = {291--304}, organization = {ACM}, publisher = {{ACM}}, } @InProceedings{GVW15, author = {Gorbunov, S. and Vaikuntanathan, V. and Wee, H.}, title = {Predicate Encryption for Circuits from {LWE}}, booktitle = {{Crypto}}, year = {2015}, number = {9216}, series = {LNCS}, pages = {503--523}, publisher = {Springer}, } @InProceedings{GVW13, author = {Gorbunov, S. and Vaikuntanathan, V. and Wee, H.}, title = {Attribute-based encryption for circuits}, booktitle = {{STOC}}, year = {2013}, pages = {545--554}, publisher = {ACM}, } @InProceedings{GKV10, author = {Gordon, S Dov and Katz, Jonathan and Vaikuntanathan, Vinod}, title = {A group signature scheme from lattice assumptions}, booktitle = {{Asiacrypt}}, year = {2010}, volume = {2647}, series = {LNCS}, pages = {395--412}, publisher = {Springer}, } @InProceedings{GH08, author = {Matthew Green and Susan Hohenberger}, title = {Universally Composable Adaptive Oblivious Transfer}, booktitle = {{Asiacrypt}}, year = {2008}, number = {5350}, series = {LNCS}, pages = {179--197}, publisher = {Springer}, } @InProceedings{Gro07, author = {J. Groth}, title = {Fully Anonymous Group Signatures without Random Oracles}, booktitle = {{Asiacrypt}}, year = {2007}, volume = {4833}, series = {LNCS}, pages = {164--180}, publisher = {Springer}, } @InProceedings{GS08, author = {J. Groth and A. Sahai}, title = {Efficient Non-interactive Proof Systems for Bilinear Groups}, booktitle = {{Eurocrypt}}, year = {2008}, volume = {4965}, series = {LNCS}, pages = {415--432}, publisher = {Springer}, } @InProceedings{HW09, author = {Hohenberger, S. and Waters, B.}, title = {Short and Stateless Signatures from the {RSA} Assumption}, booktitle = {{Crypto}}, year = {2009}, volume = {5677}, series = {LNCS}, pages = {654--670}, publisher = {Springer}, } @InProceedings{JKPT12, author = {Jain, A. and Krenn, S. and Pietrzak, K. and Tentes, A.}, title = {Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise}, booktitle = {{Asiacrypt}}, year = {2012}, volume = {7658}, series = {LNCS}, pages = {663--680}, publisher = {Springer}, } @InProceedings{KTX08, author = {Kawachi, A. and Tanaka, K. and Xagawa, K.}, title = {Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems}, booktitle = {{Asiacrypt}}, year = {2008}, volume = {5350}, series = {LNCS}, pages = {372--389}, publisher = {Springer}, } @InProceedings{KTY07, author = {Aggelos Kiayias and Yiannis Tsiounis and Moti Yung}, title = {Group Encryption}, booktitle = {{Asiacrypt}}, year = {2007}, number = {4833}, series = {LNCS}, pages = {181--199}, publisher = {Springer}, } @Article{KY06, author = {Kiayias, Aggelos and Yung, Moti}, title = {Secure scalable group signature with dynamic joins and separable authorities}, year = {2006}, volume = {1}, number = {1}, pages = {24--45}, journaltitle = {International Journal of Security and Networks}, publisher = {Inderscience}, } @InProceedings{KY05, author = {Kiayias, Aggelos and Yung, Moti}, title = {Group Signatures with Efficient Concurrent Join}, booktitle = {{Eurocrypt}}, year = {2005}, number = {3494}, series = {LNCS}, pages = {198--214}, publisher = {Springer}, } @InProceedings{LLLS13, author = {Laguillaumie, Fabien and Langlois, Adeline and Libert, Beno{\^\i}t and Stehl{\'e}, Damien}, title = {Lattice-based group signatures with logarithmic signature size}, booktitle = {{Asiacrypt}}, year = {2013}, volume = {8270}, series = {LNCS}, pages = {41--61}, publisher = {Springer}, } @InProceedings{LLNW14, author = {Langlois, Adeline and Ling, San and Nguyen, Khoa and Wang, Huaxiong}, title = {Lattice-based group signature scheme with verifier-local revocation}, booktitle = {{PKC}}, year = {2014}, volume = {8383}, series = {LNCS}, pages = {345--361}, publisher = {Springer}, } @InProceedings{LSS14, author = {Langlois, Adeline and Stehl\'e, Damien and Steinfeld, Ron}, title = {{GGHLite}: More Efficient Multilinear Maps from Ideal Lattices}, booktitle = {{Eurocrypt}}, year = {2014}, volume = {8441}, series = {LNCS}, pages = {239--256}, publisher = {Springer}, } @InProceedings{LLNW16, author = {Libert, B. and Ling, S. and Nguyen, K. and Wang, H.}, title = {Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-size Ring Signatures and Group Signatures Without Trapdoors}, booktitle = {{Eurocrypt}}, year = {2016}, volume = {9666}, series = {LNCS}, pages = {1--31}, publisher = {Springer}, } @InProceedings{LPY15, author = {Beno\^{\i}t Libert and Thomas Peters and Moti Yung}, title = {Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions}, booktitle = {{Crypto}}, year = {2015}, volume = {9216}, series = {LNCS}, pages = {296--316}, publisher = {Springer}, } @InProceedings{LNSW13, author = {Ling, San and Nguyen, Khoa and Stehl{\'e}, Damien and Wang, Huaxiong}, title = {Improved zero-knowledge proofs of knowledge for the {ISIS} problem, and applications}, booktitle = {{PKC}}, year = {2013}, volume = {7778}, pages = {107--124}, publisher = {Springer}, } @InProceedings{LAN02, author = {Helger Lipmaa and N. Asokan and Valtteri Niemi}, title = {{Secure Vickrey Auctions without Threshold Trust}}, booktitle = {Financial Cryptography}, year = {2002}, volume = {2357}, series = {LNCS}, pages = {87--101}, publisher = {Springer}, } @InProceedings{Lyu08, author = {Vadim Lyubashevsky}, title = {Lattice-Based Identification Schemes Secure Under Active Attacks}, booktitle = {{PKC}}, year = {2008}, volume = {4939}, series = {LNCS}, pages = {162--179}, publisher = {Springer}, } @InProceedings{LPR10, author = {V. Lyubashevsky and C. Peikert and O. Regev}, title = {On Ideal Lattices and Learning with Errors over Rings}, booktitle = {{Eurocrypt}}, year = {2010}, volume = {6110}, series = {LNCS}, pages = {1--23}, publisher = {Springer}, } @InProceedings{MP12, author = {Micciancio, D. and Peikert, C.}, title = {Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller}, booktitle = {{Eurocrypt}}, year = {2012}, volume = {7237}, series = {LNCS}, pages = {700--718}, publisher = {Springer}, } @InProceedings{MV03, author = {Micciancio, D. and Vadhan, S.}, title = {Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice Problems and More}, booktitle = {{Crypto}}, year = {2003}, volume = {2729}, series = {LNCS}, pages = {282--298}, publisher = {Springer}, } @InProceedings{NZZ15, author = {Nguyen, Phong Q and Zhang, Jiang and Zhang, Zhenfeng}, title = {Simpler Efficient Group Signatures from Lattices}, booktitle = {{PKC}}, year = {2015}, volume = {9020}, series = {LNCS}, pages = {401--426}, publisher = {Springer}, } @InProceedings{Pei09, author = {Peikert, C.}, title = {Public-key cryptosystems from the worst-case shortest vector problem}, booktitle = {{STOC}}, year = {2009}, pages = {333--342}, publisher = {ACM}, } @InProceedings{PV08, author = {Peikert, C. and Vaikuntanathan, V.}, title = {Non-interactive Statistical Zero-Knowledge Proofs for Lattice Problems}, booktitle = {{Crypto}}, year = {2008}, volume = {5157}, series = {LNCS}, pages = {536--553}, publisher = {Springer}, } @InProceedings{Reg05, author = {Regev, O.}, title = {On lattices, learning with errors, random linear codes, and cryptography}, booktitle = {{STOC}}, year = {2005}, pages = {84--93}, publisher = {{ACM}}, } @InProceedings{RST01, author = {Rivest, Ronald L. and Shamir, Adi and Tauman, Yael}, title = {How to Leak a Secret}, booktitle = {{Asiacrypt}}, year = {2001}, volume = {2248}, series = {LNCS}, pages = {552--565}, publisher = {Springer}, } @Article{Ste96, author = {Stern, Jacques}, title = {A new paradigm for public key identification}, year = {1996}, volume = {42}, number = {6}, pages = {1757--1768}, journaltitle = {IEEE Transactions on Information Theory}, publisher = {IEEE}, } @InProceedings{XXW13, author = {Xie, X. and Xue, R. and Wang, M.}, title = {Zero Knowledge Proofs from {Ring-LWE}}, booktitle = {{CANS}}, year = {2013}, volume = {8257}, series = {LNCS}, pages = {57--73}, publisher = {Springer}, } @Book{BSS05, title = {Advances in elliptic curve cryptography}, publisher = {Cambridge University Press}, year = {2005}, author = {Blake, Ian F and Seroussi, Gadiel and Smart, Nigel P}, volume = {317}, } @InProceedings{Che06, author = {Jung Hee Cheon}, title = {Security Analysis of the Strong Diffie-Hellman Problem}, booktitle = {Eurocrypt}, year = {2006}, editor = {Springer}, volume = {4004}, series = {LNCS}, } @Misc{NIS17, author = {NIST}, title = {{NIST post-quantum competition. Round 1.}}, month = dec, year = {2017}, note = {\url{https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Round-1-Submissions}}, } @Misc{Wun10, author = {Thomas Wunderer}, title = {Lattice Challenge}, year = {2010}, note = {\url{https://www.latticechallenge.org/index.php}}, } @InProceedings{HK17, author = {Herold, Gottfried and Kirshanova, Elena}, title = {Improved Algorithms for the Approximate k-List Problem in {E}uclidean Norm}, booktitle = {PKC'17}, year = {2017}, pages = {16--40}, publisher = {Springer}, isbn = {978-3-662-54365-8}, } @InProceedings{ADRS15, author = {Aggarwal, Divesh and Dadush, Daniel and Regev, Oded and Stephens-Davidowitz, Noah}, title = {Solving the Shortest Vector Problem in 2N Time Using Discrete Gaussian Sampling: Extended Abstract}, booktitle = {Proceedings of the Forty-seventh Annual ACM Symposium on Theory of Computing}, year = {2015}, series = {STOC '15}, pages = {733--742}, publisher = {ACM}, doi = {10.1145/2746539.2746606}, isbn = {978-1-4503-3536-2}, keywords = {discrete Gaussian, lattices, shortest vector problem}, location = {Portland, Oregon, USA}, numpages = {10}, url = {http://doi.acm.org/10.1145/2746539.2746606}, } @InProceedings{Jou00, author = {Joux, Antoine}, title = {A One Round Protocol for Tripartite Diffie--Hellman}, booktitle = {Algorithmic Number Theory}, year = {2000}, editor = {Bosma, Wieb}, pages = {385--393}, publisher = {Springer}, isbn = {978-3-540-44994-2}, } @InProceedings{BF01, author = {Boneh, Dan and Franklin, Matt}, title = {Identity-Based Encryption from the Weil Pairing}, booktitle = {Crypto}, year = {2001}, editor = {Kilian, Joe}, pages = {213--229}, publisher = {Springer}, isbn = {978-3-540-44647-7}, } @InProceedings{Wat05, author = {Waters, Brent}, title = {Efficient Identity-Based Encryption Without Random Oracles}, booktitle = {Eurocrypt}, year = {2005}, editor = {Cramer, Ronald}, pages = {114--127}, publisher = {Springer}, isbn = {978-3-540-32055-5}, } @InProceedings{KSS08, author = {Kachisa, Ezekiel J. and Schaefer, Edward F. and Scott, Michael}, title = {Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field}, booktitle = {Pairing-Based Cryptography -- Pairing}, year = {2008}, editor = {Galbraith, Steven D. and Paterson, Kenneth G.}, pages = {126--135}, publisher = {Springer}, isbn = {978-3-540-85538-5}, } @InProceedings{BN06, author = {Barreto, Paulo S. L. M. and Naehrig, Michael}, title = {Pairing-Friendly Elliptic Curves of Prime Order}, booktitle = {Selected Areas in Cryptography}, year = {2006}, editor = {Preneel, Bart and Tavares, Stafford}, pages = {319--331}, publisher = {Springer}, isbn = {978-3-540-33109-4}, } @Article{BD18, author = {Barbulescu, Razvan and Duquesne, Sylvain}, title = {Updating Key Size Estimations for Pairings}, journal = {Journal of Cryptology}, year = {2018}, month = {Jan}, issn = {1432-1378}, day = {29}, doi = {10.1007/s00145-018-9280-5}, url = {https://doi.org/10.1007/s00145-018-9280-5}, } @InProceedings{KB16, author = {Kim, Taechan and Barbulescu, Razvan}, title = {Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case}, booktitle = {Crypto}, year = {2016}, editor = {Robshaw, Matthew and Katz, Jonathan}, pages = {543--571}, publisher = {Springer}, isbn = {978-3-662-53018-4}, } @Misc{BGdMM05, author = {Lucas Ballard and Matthew Green and Breno de Medeiros and Fabian Monrose}, title = {Correlation-Resistant Storage via Keyword-Searchable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2005/417}, year = {2005}, note = {\url{https://eprint.iacr.org/2005/417}}, } @Article{KL11, author = {Kidron, Dafna and Lindell, Yehuda}, title = {Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs}, journal = {Journal of Cryptology}, year = {2011}, volume = {24}, number = {3}, pages = {517--544}, month = {Jul}, issn = {1432-1378}, day = {01}, doi = {10.1007/s00145-010-9069-7}, url = {https://doi.org/10.1007/s00145-010-9069-7}, } @InProceedings{CKL03, author = {Canetti, Ran and Kushilevitz, Eyal and Lindell, Yehuda}, title = {On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions}, booktitle = {Eurocrypt}, year = {2003}, editor = {Biham, Eli}, pages = {68--86}, publisher = {Springer}, isbn = {978-3-540-39200-2}, } @Article{CKL06, author = {Canetti, Ran and Kushilevitz, Eyal and Lindell, Yehuda}, title = {On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions}, journal = {Journal of Cryptology}, year = {2006}, volume = {19}, number = {2}, pages = {135--167}, month = {Apr}, issn = {1432-1378}, day = {01}, doi = {10.1007/s00145-005-0419-9}, url = {https://doi.org/10.1007/s00145-005-0419-9}, } @InProceedings{Yao86, author = {Yao, Andrew Chi-Chih}, title = {How to generate and exchange secrets}, booktitle = {FOCS}, year = {1986}, } @InProceedings{LP07, author = {Lindell, Yehuda and Pinkas, Benny}, title = {An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries}, booktitle = {Eurocrypt}, year = {2007}, editor = {Naor, Moni}, pages = {52--78}, publisher = {Springer}, isbn = {978-3-540-72540-4}, } @InProceedings{Coo71, author = {Cook, Stephen A.}, title = {The Complexity of Theorem-proving Procedures}, booktitle = {Proceedings of the Third Annual ACM Symposium on Theory of Computing}, year = {1971}, series = {STOC '71}, pages = {151--158}, publisher = {ACM}, doi = {10.1145/800157.805047}, location = {Shaker Heights, Ohio, USA}, numpages = {8}, url = {http://doi.acm.org/10.1145/800157.805047}, } @InProceedings{MSS17, author = {Menezes, Alfred and Sarkar, Palash and Singh, Shashank}, title = {{Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-Based Cryptography}}, booktitle = {Paradigms in Cryptology -- Mycrypt. Malicious and Exploratory Cryptology}, year = {2017}, editor = {Phan, Rapha{\"e}l C.-W. and Yung, Moti}, pages = {83--108}, publisher = {Springer}, isbn = {978-3-319-61273-7}, } @Article{Gil77, author = {John Gill}, title = {{Computational Complexity of Probabilistic Turing Machines}}, journal = {SIAM J. on Computing}, year = {1977}, volume = {6}, number = {4}, pages = {675--695}, doi = {10.1137/0206049}, eprint = {https://doi.org/10.1137/0206049}, url = { https://doi.org/10.1137/0206049 }, } @Misc{Rab60, author = {Rabin, Michael Oser}, title = {Degree of difficulty of computing a function and a partial ordering of recursive sets}, howpublished = {Technical Report 2, {Hebrew University of Jerusalem}}, year = {1960}, publisher = {Hebrew University}, } @Book{AB09, title = {Computational Complexity: A Modern Approach}, publisher = {Cambridge University Press}, year = {2009}, author = {Arora, Sanjeev and Barak, Boaz}, edition = {1st}, isbn = {0521424267, 9780521424264}, } @Book{KL07, title = {Introduction to Modern Cryptography (Chapman \& Hall/Crc Cryptography and Network Security Series)}, publisher = {Chapman \& Hall/CRC}, year = {2007}, author = {Katz, Jonathan and Lindell, Yehuda}, isbn = {1584885513}, } @InProceedings{BR93, author = {Bellare, Mihir and Rogaway, Phillip}, title = {Random Oracles Are Practical: A Paradigm for Designing Efficient Protocols}, booktitle = {CCS}, year = {1993}, publisher = {ACM}, doi = {10.1145/168588.168596}, isbn = {0-89791-629-8}, location = {Fairfax, Virginia, USA}, numpages = {12}, url = {http://doi.acm.org/10.1145/168588.168596}, } @Article{CGH04, author = {Canetti, Ran and Goldreich, Oded and Halevi, Shai}, title = {The Random Oracle Methodology, Revisited}, journal = {J. of ACM}, year = {2004}, volume = {51}, number = {4}, pages = {557--594}, month = jul, issn = {0004-5411}, doi = {10.1145/1008731.1008734}, issue_date = {July 2004}, keywords = {CS-proofs, Correlation intractability, cryptography, diagonalization, the random-oracle model}, numpages = {38}, publisher = {ACM}, url = {http://doi.acm.org/10.1145/1008731.1008734}, } @InProceedings{LLM+17, author = {Libert, Beno{\^i}t and Ling, San and Mouhartem, Fabrice and Nguyen, Khoa and Wang, Huaxiong}, title = {Adaptive Oblivious Transfer with Access Control from Lattice Assumptions}, booktitle = {Asiacrypt}, year = {2017}, editor = {Takagi, Tsuyoshi and Peyrin, Thomas}, pages = {533--563}, publisher = {Springer}, isbn = {978-3-319-70694-8}, } @InProceedings{LMPY16, author = {Libert, Beno\^{\i}t and Mouhartem, Fabrice and Peters, Thomas and Yung, Moti}, title = {Practical "Signatures with Efficient Protocols" from Simple Assumptions}, booktitle = {AsiaCCS}, year = {2016}, pages = {511--522}, publisher = {ACM}, doi = {10.1145/2897845.2897898}, isbn = {978-1-4503-4233-9}, keywords = {anonymous credentials, efficient privacy-enhancing protocols, group signatures, privacy, signature, signature with efficient protocols, simple cryptographic assumptions}, location = {Xi'an, China}, numpages = {12}, url = {http://doi.acm.org/10.1145/2897845.2897898}, } @Article{GM84, author = {Shafi Goldwasser and Silvio Micali}, title = {Probabilistic encryption}, journal = {J. of Computer and System Sciences}, year = {1984}, volume = {28}, number = {2}, pages = {270--299}, issn = {0022-0000}, doi = {https://doi.org/10.1016/0022-0000(84)90070-9}, url = {http://www.sciencedirect.com/science/article/pii/0022000084900709}, } @Book{Gol04, title = {Foundations of Cryptography: Volume 2, Basic Applications}, publisher = {Cambridge University Press}, year = {2004}, author = {Goldreich, Oded}, isbn = {0521830842}, } @InProceedings{CF01, author = {Canetti, Ran and Fischlin, Marc}, title = {Universally Composable Commitments}, booktitle = {Crypto}, year = {2001}, pages = {19--40}, publisher = {Springer}, isbn = {978-3-540-44647-7}, } @Comment{jabref-meta: databaseType:bibtex;}