thesis/these.bib

3240 lines
100 KiB
BibTeX
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

% Encoding: UTF-8
@InCollection{CL02,
author = {Camenisch, Jan and Lysyanskaya, Anna},
title = {A Signature Scheme with Efficient Protocols},
booktitle = {{SCN}},
publisher = {Springer},
year = {2002},
number = {2576},
series = {LNCS},
pages = {268--289},
}
@InCollection{CS97,
author = {Camenisch, Jan and Stadler, Markus},
title = {Efficient group signature schemes for large groups},
booktitle = {{Crypto}},
publisher = {Springer},
year = {1997},
}
@InProceedings{CS99,
author = {Cramer, R. and Shoup, V.},
title = {{Signature Schemes Based On the Strong {RSA} Assumption}},
booktitle = {{ACM-CCS}},
year = {1999},
publisher = {ACM},
}
@InProceedings{FO97,
author = {Fujisaki, E. and Okamoto, T.},
title = {Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations},
booktitle = {{Crypto}},
year = {1997},
volume = {1294},
series = {LNCS},
publisher = {Springer},
}
@Misc{Inu12,
author = {Inutile, Club},
title = {The Password Security Checker},
howpublished = {Website, available at {\url{http://inutile.club/estatis/password-security-checker/}}},
year = {2012},
}
@InCollection{LNW15,
author = {Ling, San and Nguyen, Khoa and Wang, Huaxiong},
title = {{Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based}},
booktitle = {{PKC}},
publisher = {Springer},
year = {2015},
volume = {9020},
series = {LNCS},
pages = {427--449},
url = {http://dx.doi.org/10.1007/978-3-662-46447-2_19},
}
@InProceedings{Lyu12,
author = {Lyubashevsky, V.},
title = {Lattice Signatures Without Trapdoors},
booktitle = {{Eurocrypt}},
year = {2012},
volume = {7237},
series = {LNCS},
publisher = {Springer},
}
@InProceedings{PSTY13,
author = {Charalampos Papamanthou and Elaine Shi and Roberto Tamassia and Ke Yi},
title = {Streaming Authenticated Data Structures},
booktitle = {{Eurocrypt}},
year = {2013},
volume = {7881},
series = {LNCS},
pages = {353--370},
publisher = {Springer},
}
@Misc{Pei15,
author = {Peikert, Chris},
title = {A Decade of Lattice Cryptography},
howpublished = {Cryptology ePrint Archive: Report 2015/939},
year = {2015},
}
@InProceedings{ACDN13,
author = {Abe, Masayuki and Camenisch, Jan and Dubovitskaya, Maria and Nishimaki, Ryo},
title = {Universally composable adaptive oblivious transfer (with access control) from standard assumptions},
booktitle = {ACM Workshop on Digital Identity Management},
year = {2013},
pages = {1--12},
doi = {10.1145/2517881.2517883},
}
@InProceedings{AIR01,
author = {William Aiello and Yuval Ishai and Omer Reingold},
title = {Priced oblivious transfer: How to sell digital goods},
booktitle = {Eurocrypt},
year = {2001},
pages = {119--135},
}
@InProceedings{AKPW13,
author = {Alwen, Jo\"el and Krenn, Stephan and Pietrzak, Krzysztof and Wichs, Daniel},
title = {Learning with Rounding Revisited -- New Reduction, Properties and Applications},
booktitle = {{Crypto}},
year = {2013},
volume = {8042},
series = {LNCS},
pages = {57--74},
organization = {Springer},
}
@InProceedings{AWSM07,
author = {Man Ho Au and Qianhong Wu and Willy Susilo and Yi Mu},
title = {Compact E-Cash from Bounded Accumulator},
booktitle = {{CT-RSA}'07},
year = {2007},
number = {4377},
series = {LNCS},
pages = {178--195},
}
@Misc{Ban15,
author = {Banerjee, A.},
title = {New Constructions of Cryptographic Pseudo-Random Functions},
howpublished = {PhD thesis, Georgia Institute of Technology},
year = {2015},
}
@InProceedings{BBL+14,
author = {Banerjee, A. and Brenner, H. and Leurent, G. and Peikert, C. and Rosen, A.},
title = {SPRING: Fast Pseudorandom Functions from Rounded Ring Products},
booktitle = {{FSE}},
year = {2014},
volume = {8540},
series = {LNCS},
pages = {38--57},
}
@InProceedings{BP14,
author = {Banerjee, Abhishek and Peikert, Chris},
title = {New and Improved Key-Homomorphic Pseudo-Random Functions},
booktitle = {{Crypto}},
year = {2014},
volume = {8616},
series = {LNCS},
pages = {353--370},
organization = {Springer},
}
@InProceedings{BPR12,
author = {Banerjee, Abhishek and Peikert, Chris and Rosen, Alon},
title = {Pseudo-Random Functions and Lattices},
booktitle = {{Eurocrypt}},
year = {2012},
volume = {7237},
series = {LNCS},
pages = {719--737},
organization = {Springer},
}
@InProceedings{BBSU12,
author = {Barber, S. and Boyen, X. and Shi, E. and Uzun, E.},
title = {Bitter to Better : How to Make Bitcoin a Better Currency},
booktitle = {{Financial Cryptography}},
year = {2012},
volume = {7397},
series = {LNCS},
pages = {399--414},
}
@InProceedings{Bar86,
author = {Barrington, D.},
title = {Bounded-Width Polynomial-Size Branching Programs Recognize Exactly Those Languages in NC1},
booktitle = {{STOC}'86},
year = {1986},
pages = {1--5},
}
@InProceedings{BCKL08,
author = {Belenkiy, Mira and Chase, Melissa and Kohlweiss, Markulf and Lysyanskaya, Anna},
title = {{P-signatures and Noninteractive Anonymous Credentials}},
booktitle = {{TCC}},
year = {2008},
number = {4948},
series = {LNCS},
pages = {356--374},
publisher = {Springer},
}
@InProceedings{BCKL09,
author = {Belenkiy, Mira and Chase, Melissa and Kohlweiss, Markulf and Lysyanskaya, Anna},
title = {{Compact E-Cash and Simulatable VRFs Revisited}},
booktitle = {{Pairing}},
year = {2009},
volume = {5671},
series = {LNCS},
pages = {114--131},
publisher = {Springer},
}
@InProceedings{BCG+14,
author = {Eli Ben-Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and Ian Miers and Eran Tromer and Madars Virza},
title = {Zerocash: Decentralized Anonymous Payments from Bitcoin},
booktitle = {{IEEE Symposium on Security and Privacy}},
year = {2014},
pages = {459--474},
}
@InProceedings{BGM+16,
author = {Bogdanov, Andrej and Guo, Siyao and Masny, Daniel and Richelson, Silas and Rosen, Alon},
title = {On the Hardness of Learning With Rounding over Small Modulus},
booktitle = {{TCC}},
year = {2016},
volume = {9562},
series = {LNCS},
pages = {209--224},
}
@InProceedings{BGG+14,
author = {Boneh, D. and Gentry, C. and Gorbunov, S. and Halevi, S. and Nikolaenko, V. and Segev, G. and Vaikuntanathan, V. and Vinayagamurthy, D.},
title = {Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits},
booktitle = {{Eurocrypt}},
year = {2014},
}
@InProceedings{BLMR13,
author = {Boneh, Dan and Lewi, Kevin and Montgomery, Hart and Raghunathan, Ananth},
title = {Key-Homomorphic PRFs and their Applications},
booktitle = {{Crypto}},
year = {2013},
volume = {8042},
series = {LNCS},
pages = {410--428},
organization = {Springer},
}
@InProceedings{BDPMW16,
author = {Bourse, F. and del Pino, R. and Minelli, M. and Wee, H},
title = {{FHE Circuit Privacy Almost for Free}},
booktitle = {{Crypto}},
year = {2016},
number = {9815},
series = {LNCS},
pages = {62--89},
}
@InProceedings{BV11,
author = {Brakerski, Z. and Vaikuntanathan, V.},
title = {Efficient Fully Homomorphic Encryption from (Standard) {LWE}},
booktitle = {{FOCS}},
year = {2011},
pages = {97--106},
}
@TechReport{Bra93,
author = {Brands, S.},
title = {An efficient off-line electronic cash system based on the representation problem},
institution = {Technical Report CS-R9323, CWI},
year = {1993},
}
@InProceedings{BCR87,
author = {Brassard, Gilles and Cr{\'e}peau, Claude and Robert, Jean-Marc},
title = {All-or-nothing disclosure of secrets.},
booktitle = {{Crypto}},
year = {1987},
volume = {263},
series = {LNCS},
pages = {234--238},
}
@InProceedings{CCs08,
author = {Camenisch, J. and Chaabouni, R. and shelat, a.},
title = {Efficient Protocols for Set Membership and Range Proofs},
booktitle = {{Asiacrypt}},
year = {2008},
volume = {5350},
series = {LNCS},
pages = {234--252},
}
@InProceedings{CD00,
author = {Camenisch, J. and Damg{\aa}rd, I.},
title = {Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes},
booktitle = {{Asiacrypt}},
year = {2000},
volume = {1976},
series = {LNCS},
pages = {331--345},
}
@InProceedings{CDEN12,
author = {Camenisch, J. and Dubovitskaya, M. and Enderlein, R. and Neven, G.},
title = {Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption},
booktitle = {{SCN}},
year = {2012},
volume = {7485},
series = {LNCS},
pages = {559--579},
}
@InProceedings{CDN09,
author = {Camenisch, J. and Dubovitskaya, M. and Neven, G.},
title = {Oblivious transfer with access control},
booktitle = {{ACM-CCS}},
year = {2009},
pages = {131--140},
}
@InProceedings{CDNZ11,
author = {Camenisch, J. and Dubovitskaya, M. and Neven, G. and Zaverucha, G.},
title = {Oblivious Transfer with Hidden Access Control Policies},
booktitle = {{PKC}'11},
year = {2011},
volume = {6571},
series = {LNCS},
pages = {192--209},
}
@InProceedings{CHL05,
author = {Camenisch, Jan and Hohenberger, Susan and Lysyanskaya, Anna},
title = {{Balancing Accountability and Privacy Using E-Cash}},
booktitle = {{SCN}},
year = {2005},
number = {4116},
series = {LNCS},
pages = {141--155},
}
@InProceedings{CL02a,
author = {Camenisch, Jan and Lysyanskaya, Anna},
title = {A Signature Scheme with Efficient Protocols},
booktitle = {{Security and Cryptography for Networks} (SCN'02)},
year = {2002},
number = {2576},
series = {LNCS},
pages = {268--289},
}
@InProceedings{CL04,
author = {Camenisch, Jan and Lysyanskaya, Anna},
title = {{Signature Schemes and Anonymous Credentials from Bilinear Maps}},
booktitle = {{Crypto}},
year = {2004},
number = {3152},
series = {LNCS},
pages = {56--72},
publisher = {Springer},
}
@InProceedings{CLM07,
author = {Camenisch, Jan and Lysyanskaya, Anna and Meyerovich, M.},
title = {Endorsed E-Cash},
booktitle = {{IEEE Security \& Privacy }},
year = {2007},
pages = {101--115},
}
@InProceedings{CNs07,
author = {Camenisch, J. and Neven, G. and shelat, a.},
title = {Simulatable Adaptive Oblivious Transfer},
booktitle = {{Eurocrypt}},
year = {2007},
volume = {4515},
series = {LNCS},
pages = {573--590},
}
@InProceedings{CS97a,
author = {Camenisch, Jan and Stadler, Markus},
title = {Efficient group signature schemes for large groups},
booktitle = {Crypto'97},
year = {1997},
pages = {410--424},
}
@InProceedings{CG07,
author = {Canard, S. and Gouget, A.},
title = {Divisible E-Cash Systems Can Be Truly Anonymous},
booktitle = {{Eurocrypt}},
year = {2007},
volume = {4515},
series = {LNCS},
pages = {482--497},
}
@InProceedings{CG08a,
author = {Canard, S. and Gouget, A.},
title = {Anonymity in Transferable E-cash},
booktitle = {{ACNS}},
year = {2008},
volume = {5037},
series = {LNCS},
pages = {207--223},
}
@InProceedings{CG10,
author = {Canard, S. and Gouget, A.},
title = {Multiple Denominations in E-cash with Compact Transaction Data},
booktitle = {{Financial Cryptography}},
year = {2010},
volume = {6052},
series = {LNCS},
pages = {82--97},
}
@InProceedings{CGT08,
author = {Canard, S. and Gouget, A. and Traor\'e, J.},
title = {Improvement of Efficiency in (Unconditional) Anonymous Transferable E-Cash},
booktitle = {{Financial Cryptography}},
year = {2008},
volume = {5143},
series = {LNCS},
pages = {202--214},
}
@InProceedings{CPST15,
author = {Canard, S. and Pointcheval, D. and Sanders, O. and Traor\'e, J.},
title = {Divisible E-Cash Made Practical},
booktitle = {{PKC}},
year = {2015},
volume = {9020},
series = {LNCS},
pages = {77--100},
}
@InProceedings{CPST15a,
author = {Canard, S. and Pointcheval, D. and Sanders, O. and Traor\'e, J.},
title = {Scalable Divisible E-cash},
booktitle = {{ACNS}},
year = {2015},
volume = {9092},
series = {LNCS},
pages = {287--306},
}
@Article{Can00,
author = {Canetti, Ran},
title = {Security and composition of multi-party cryptographic protocols},
year = {2000},
volume = {13},
number = {1},
pages = {143--202},
journaltitle = {Journal of Cryptology},
}
@InProceedings{Can01,
author = {Canetti, R.},
title = {Universally Composable Security: A New Paradigm for Cryptographic Protocols},
booktitle = {{FOCS}},
year = {2001},
pages = {136--145},
}
@InProceedings{CFT98,
author = {Chan, A. and Frankel, Y. and Tsiounis, Y.},
title = {Easy come, easy go divisible cash},
booktitle = {{Eurocrypt}},
year = {1998},
volume = {1403},
series = {LNCS},
pages = {561--575},
publisher = {Springer},
}
@InProceedings{Cha82,
author = {Chaum, D.},
title = {Blind Signatures for Untraceable Payments},
booktitle = {{Crypto}},
year = {1982},
series = {LNCS},
pages = {199--203},
}
@InProceedings{Cha83,
author = {Chaum, D.},
title = {Blind Signature System},
booktitle = {{Crypto}},
year = {1983},
series = {LNCS},
pages = {153},
}
@InProceedings{Cha89,
author = {Chaum, D.},
title = {On-line Cash Checks},
booktitle = {{Eurocrypt}},
year = {1989},
volume = {434},
series = {LNCS},
pages = {2893293},
}
@InProceedings{CFN88,
author = {Chaum, D. and Fiat, A. and Naor, M.},
title = {Untraceable electronic cash},
booktitle = {{Crypto}},
year = {1988},
volume = {403},
series = {LNCS},
pages = {319--327},
}
@InProceedings{CP92,
author = {Chaum, D. and Pedersen, T.},
title = {{Transferred Cash Grows in Size}},
booktitle = {{Eurocrypt}},
year = {1992},
volume = {658},
series = {LNCS},
pages = {390--407},
}
@InProceedings{CGKS95,
author = {Chor, B. and Goldreich, O. and Kushilevitz, E. and Sudan, M.},
title = {Private Information Retrieval},
booktitle = {{FOCS}},
year = {1995},
pages = {41--50},
}
@InProceedings{Chu05,
author = {Chu, C.-K. ad Tzeng, W.-G.},
title = {Efficient k-out-of-n Oblivious Transfer Schemes With Adaptive and Non-Adaptive Queries},
booktitle = {{PKC}},
year = {2005},
number = {3386},
series = {LNCS},
pages = {172--183},
}
@InProceedings{CGH09,
author = {Coull, S. and Green, M. and Hohenberger, S.},
title = {Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials},
booktitle = {{PKC}},
year = {2009},
number = {5443},
series = {LNCS},
}
@InProceedings{CD09,
author = {Cramer, Ronald and Damg{\aa}rd, Ivan},
title = {On the Amortized Complexity of Zero-Knowledge Protocols},
booktitle = {{Crypto}},
year = {2009},
volume = {5677},
series = {LNCS},
pages = {177--191},
__markedentry = {[fmouhart:]},
}
@InProceedings{CK88,
author = {Cr{\'e}peau, Claude and Kilian, Joe},
title = {Weakening security assumptions and Oblivious Transfer},
booktitle = {Crypto},
year = {1988},
pages = {2--7},
}
@InProceedings{DDC94,
author = {D'Amiano, S. and Di Crescenzo, G.},
title = {Methodology for Digital Money based on General Cryptographic Tools},
booktitle = {{Eurocrypt}},
year = {1994},
volume = {950},
series = {LNCS},
pages = {156--170},
}
@InProceedings{DN03,
author = {Damg{\aa}rd, I. and Nielsen, J.-B.},
title = {Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption},
booktitle = {{Crypto}},
year = {2003},
number = {2729},
series = {LNCS},
pages = {247--264},
}
@InProceedings{DCOR99,
author = {Di Crescenzo, G. and Ostrovsky, R. and Rajagopalan, S.},
title = {Conditional oblivious transfer and timed-release encryption},
booktitle = {{Eurocrypt}'99},
year = {1999},
number = {1592},
series = {LNCS},
pages = {74--89},
}
@InProceedings{Dod03,
author = {Dodis, Y.},
title = {Efficient Construction of (Distributed) Verifiable Random Functions},
booktitle = {{PKC}},
year = {2003},
volume = {2567},
series = {LNCS},
pages = {1--17},
}
@InProceedings{DY05,
author = {Dodis, Y. and Yampolskiy, A.},
title = {A Verifiable Random Function with Short Proofs and Keys},
booktitle = {{PKC}},
year = {2005},
number = {3386},
series = {LNCS},
pages = {416--431},
}
@InProceedings{DFKS16,
author = {D\"ottling, N. and Fleischhacker, N. and Krupp, J. and Schr\"oder, D.},
title = {Two-Message, Oblivious Evaluation of Cryptographic Functionalities},
booktitle = {{Crypto}},
year = {2016},
number = {9816},
series = {LNCS},
pages = {619--648},
}
@InProceedings{DS15,
author = {D\"ottling, N. and Schr\"oder, D.},
title = {Efficient Pseudorandom Functions via On-the-Fly Adaptation},
booktitle = {{Crypto}},
year = {2015},
volume = {9215},
series = {LNCS},
pages = {329--350},
}
@InProceedings{DS16,
author = {Ducas, L. and Stehl\'e, D.},
title = {Sanitization of {FHE} Ciphertexts},
booktitle = {{Eurocrypt}},
year = {2016},
series = {LNCS},
note = {Cryptology ePrint Archive: Report 2016/164},
}
@Article{EGL85,
author = {Even, S. and Goldreich, O. and Lempel, A.},
title = {A Randomized Protocol for Signing Contracts},
year = {1985},
volume = {28},
number = {6},
pages = {637--647},
journaltitle = {Communications of the {ACM}},
}
@InProceedings{FTY96,
author = {Frankel, Y. and Tsiounis, Y. and Yung, M.},
title = {"Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash},
booktitle = {{Asiacrypt}},
year = {1996},
volume = {1163},
series = {LNCS},
pages = {286--300},
publisher = {Springer},
}
@InProceedings{FY93,
author = {Franklin, M. and Yung, M.},
title = {Secure and Efficient Off-Line Digital Money},
booktitle = {{ICALP}},
year = {1993},
volume = {700},
series = {LNCS},
pages = {265--276},
publisher = {Springer},
}
@InProceedings{FIPR05,
author = {Freedman, M. and Ishai, Y. and Pinkas, B. and Reingold, O.},
title = {Keyword Search and Oblivious Pseudorandom Functions},
booktitle = {{TCC}},
year = {2005},
volume = {3378},
series = {LNCS},
pages = {303--324},
}
@InProceedings{FPV09,
author = {Fuchsbauer, G. and Pointcheval, D. and Vergnaud, D.},
title = {Transferable Constant-Size Fair E-Cash},
booktitle = {{CANS}},
year = {2009},
volume = {5888},
series = {LNCS},
pages = {226--247},
}
@InProceedings{GSW13,
author = {Gentry, C. and Sahai, A. and Waters, B.},
title = {Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based},
booktitle = {{Crypto}},
year = {2013},
number = {8042},
series = {LNCS},
pages = {75--92},
}
@InProceedings{GGM86,
author = {Goldreich, O. and Goldwasser, S. and Micali, S.},
title = {How to construct random functions},
booktitle = {J. of {ACM}},
year = {1986},
volume = {33},
number = {4},
pages = {792--807},
}
@InProceedings{GMW87,
author = {Goldreich, Oded and Micali, Silvio and Wigderson, Avi},
title = {How to play any mental game or a completeness theorem for protocols with honest majority},
booktitle = {STOC},
year = {1987},
pages = {218--229},
}
@InProceedings{GV15,
author = {Gorbunov, S. and Vinayagamurthy, D.},
title = {Riding on Asymmetry: Efficient ABE for Branching Programs},
booktitle = {{Asiacrypt}},
year = {2015},
}
@InProceedings{GH07,
author = {Green, M. and Hohenberger, S.},
title = {Blind Identity-Based Encryption and Simulatable Oblivious Transfer},
booktitle = {{Asiacrypt}},
year = {2007},
volume = {4833},
series = {LNCS},
pages = {265--282},
}
@InProceedings{GH11,
author = {Green, M. and Hohenberger, S.},
title = {Practical Adaptive Oblivious Transfer from Simple Assumptions},
booktitle = {{TCC}},
year = {2011},
volume = {6597},
series = {LNCS},
pages = {347--363},
}
@Article{Her11,
author = {Herranz, J.},
title = {Restricted Adaptive Oblivious Transfer},
journal = {Theoretical Computer Science},
year = {2011},
volume = {412},
number = {46},
pages = {6498--6506},
publisher = {Elsevier},
}
@InProceedings{HAO15,
author = {Hiromasa, R. and Abe, M. and Okamoto, T.},
title = {Packing Messages and Optimizing Bootstrapping in {GSW-FHE}},
booktitle = {{PKC}},
year = {2015},
number = {9020},
series = {LNCS},
pages = {699--715},
chapter = {Hiromasa, R. and Abe, M. and Okamoto, T.},
}
@Misc{Inu12a,
author = {Inutile, Club},
title = {The Password Security Checker},
howpublished = {Website, available at {\url{http://inutile.club/estatis/password-security-checker/}}},
year = {2012},
}
@InProceedings{IP07,
author = {Yuval Ishai and Anat Paskin},
title = {Evaluating Branching Programs on Encrypted Data},
booktitle = {{TCC}},
year = {2007},
}
@InProceedings{JL09,
author = {Jarecki, S. and Liu, X.},
title = {Efficient Oblivious Pseudorandom Function with Applications to Adaptive {OT} and Secure Computation of Set Intersection},
booktitle = {{TCC}},
year = {2009},
volume = {5444},
series = {LNCS},
pages = {577--594},
}
@InProceedings{JS07,
author = {Jarecki, S. and Shmatikov, V.},
title = {Efficient Two-Party Secure Computation on Committed Inputs},
booktitle = {{Eurocrypt}},
year = {2007},
volume = {4515},
series = {LNCS},
pages = {97--114},
}
@InProceedings{Kil88,
author = {Kilian, J.},
title = {Founding Cryptography on Oblivious Transfer},
booktitle = {{STOC}},
year = {1988},
}
@InProceedings{KP06,
author = {Kunz-Jacques, S{\'{e}}bastien and Pointcheval, David},
title = {About the security of {MTI/C0} and {MQV}},
booktitle = {SCN'06},
year = {2006},
publisher = {Springer},
pages = {156--172},
}
@InProceedings{KN09,
author = {Kurosawa, K. and Nojima, R.},
title = {Simple Adaptive Oblivious Transfer Without Random Oracle},
booktitle = {{Asiacrypt}},
year = {2009},
volume = {5912},
series = {LNCS},
pages = {334--346},
}
@InProceedings{KPN10,
author = {Kurosawa, K. and Phong, L. and Nojima, R.},
title = {Efficiency-Improved Fully Simulatable Adaptive {OT} under the {DDH} Assumption},
booktitle = {{SCN}},
year = {2010},
volume = {6280},
series = {LNCS},
pages = {172--181},
}
@InProceedings{KPN11,
author = {Kurosawa, K. and Phong, L. and Nojima, R.},
title = {Generic Fully Simulatable Adaptive Oblivious Transfer},
booktitle = {{ACNS}},
year = {2011},
volume = {6715},
series = {LNCS},
pages = {274--291},
}
@InProceedings{LOS+10,
author = {Lewko, A. and Okamoto, T. and Sahai, A. and Takashima, K. and Waters, B.},
title = {Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption},
booktitle = {{Eurocrypt}},
year = {2010},
number = {6110},
series = {LNCS},
}
@InProceedings{LLM+16,
author = {Libert, B. and Ling, S. and Mouhartem, F. and Nguyen, K. and Wang, H.},
title = {Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions},
booktitle = {{Asiacrypt}},
year = {2016},
url = {http://ia.cr/2016/101},
}
@InProceedings{LLM+16a,
author = {Libert, B. and Ling, S. and Mouhartem, F. and Nguyen, K. and Wang, H.},
title = {Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption},
booktitle = {{Asiacrypt}},
year = {2016},
url = {https://ia.cr/2016/879},
}
@InProceedings{Lin08,
author = {Lindell, Andrew Y.},
title = {Efficient Fully-Simulatable Oblivious Transfer},
booktitle = {CT-RSA},
year = {2008},
series = {LNCS},
journaltitle = {CT-RSA},
}
@Misc{Lip08,
author = {Helger Lipmaa},
title = {{Private Branching Programs: On Communication-Efficient Cryptocomputing}},
howpublished = {Cryptology ePrint Archive, Report 2008/107},
year = {2008},
note = {\url{https://ia.cr/2008/107}},
}
@InProceedings{Mer89,
author = {Ralph C. Merkle},
title = {{A Certified Digital Signature}},
booktitle = {{Crypto}},
year = {1989},
pages = {218--238},
publisher = {Springer},
}
@InProceedings{MRV99,
author = {Micali, S. and Rabin, M. and Vadhan, S.},
title = {Verifiable Random Functions},
booktitle = {FOCS},
year = {1999},
pages = {120--130},
}
@InProceedings{MS95,
author = {Micali, S. and Sidney, R.},
title = {A simple method for generating and sharing pseudo-random functions},
booktitle = {{Crypto}},
year = {1995},
volume = {963},
series = {LNCS},
pages = {185196},
}
@InProceedings{MGGR13,
author = {Miers, I. and Garman, C. and Green, M. and Rubin, A.},
title = {Zerocoin: Anonymous Distributed E-Cash from Bitcoin},
booktitle = {{IEEE Security \& Privacy}},
year = {2013},
pages = {397--411},
}
@InProceedings{MW16,
author = {Mukherjee, P. and Wichs, D.},
title = {Two Round Mutliparty Computation via Multi-Key FHE},
booktitle = {{Eurocrypt}},
year = {2016},
series = {LNCS},
note = {To appear},
}
@Misc{Nak,
author = {Nakamoto, S.},
title = {Bitcoin: A peer-to-peer electronic cash system},
howpublished = {\url{www.bitcoin.org}},
}
@InProceedings{NP01,
author = {Naor, Moni and Pinkas, Benny},
title = {Efficient oblivious transfer protocols.},
booktitle = {SODA},
year = {2001},
pages = {448--457},
}
@Article{NP05,
author = {Naor, M. and Pinkas, B.},
title = {Computationally Secure Oblivious Transfer},
year = {2005},
volume = {18},
number = {1},
pages = {1--35},
journaltitle = {Journal of Cryptology},
}
@InProceedings{NP99,
author = {Naor, M. and Pinkas, B.},
title = {Oblivious transfer with adaptive queries},
booktitle = {{Crypto}},
year = {1999},
volume = {1666},
series = {LNCS},
pages = {573--590},
}
@InProceedings{NPR99,
author = {Naor, M. and Pinkas, B. and Reingold, O.},
title = {Distributed Pseudo-random Functions and KDCs},
booktitle = {{Eurocrypt}},
year = {1999},
volume = {1592},
series = {LNCS},
pages = {327--346},
}
@InProceedings{NYO08,
author = {Nishide, T. and Yoneyama, K. and Ohta, K.},
title = {Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures},
booktitle = {{ACNS}'08},
year = {2008},
number = {5037},
series = {LNCS},
pages = {111--129},
}
@InProceedings{OO89,
author = {Ohta, K. and Okamoto, T.},
title = {Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash},
booktitle = {{Crypto}},
year = {1989},
volume = {435},
series = {LNCS},
pages = {481--496},
}
@InProceedings{OO91,
author = {Ohta, K. and Okamoto, T.},
title = {Universal Electronic Cash},
booktitle = {{Crypto}},
year = {1991},
volume = {576},
series = {LNCS},
pages = {324--337},
publisher = {Springer},
}
@InProceedings{Oka95,
author = {Okamoto, T.},
title = {An Efficient Divisible Electronic Cash Scheme},
booktitle = {{Crypto}},
year = {1995},
volume = {963},
series = {LNCS},
pages = {438--451},
publisher = {Springer},
}
@InProceedings{Pai92,
author = {Pailles, J.-C.},
title = {New Protocols for Electronic Money},
booktitle = {{Auscrypt}},
year = {1992},
volume = {718},
series = {LNCS},
pages = {263--274},
publisher = {Springer},
}
@Misc{Pei15a,
author = {Peikert, Chris},
title = {A Decade of Lattice Cryptography},
howpublished = {Cryptology ePrint Archive: Report 2015/939},
year = {2015},
}
@InProceedings{PVW08,
author = {Peikert, C. and Vaikuntanathan, V. and Waters, B.},
title = {A Framework for Efficient and Composable Oblivious Transfer},
booktitle = {{Crypto}},
year = {2008},
volume = {5157},
series = {LNCS},
pages = {554--571},
}
@Misc{Rab81,
author = {Rabin, M.},
title = {How to exchange secrets by oblivious transfer},
howpublished = {Technical Report TR-81, Aiken Computation Laboratory, Harvard University},
year = {1981},
}
@Article{Reg09,
author = {Oded Regev},
title = {{On Lattices, Learning with Errors, Random Linear Codes, and Cryptography}},
year = {2009},
volume = {56},
number = {6},
bibsource = {DBLP, http://dblp.uni-trier.de},
ee = {http://doi.acm.org/10.1145/1568318.1568324},
journaltitle = {Journal of the ACM},
}
@InProceedings{RKP09,
author = {Alfredo Rial and Markulf Kohlweiss and Bart Preneel},
title = {Universally composable adaptive priced oblivious transfer},
booktitle = {Pairing'09},
year = {2009},
publisher = {Springer},
series = {LNCS},
pages = {231--247},
}
@InProceedings{Ruec10,
author = {Rückert, M.},
title = {{Lattice-Based Blind Signatures}},
booktitle = {{Asiacrypt}},
year = {2010},
volume = {6477},
series = {LNCS},
pages = {413--430},
}
@InProceedings{SW05,
author = {Sahai, A. and Waters, B.},
title = {Fuzzy Identity-Based Encryption},
booktitle = {{Eurocrypt}},
year = {2005},
number = {3494},
series = {LNCS},
pages = {457--473},
}
@InProceedings{SSE+12,
author = {Sakai, Y. and Schuldt, J. and Emura, K. and Hanaoka, G. and Ohta, K.},
title = {On the Security of Dynamic Group Signatures: Preventing Signature Hijacking},
booktitle = {PKC},
year = {2012},
volume = {7293},
series = {LNCS},
pages = {715--732},
edition = {Springer},
}
@Article{vSN92,
author = {von Solms, S. and Naccache, D.},
title = {On blind signatures and perfect crimes},
year = {1992},
volume = {11},
pages = {581583},
journaltitle = {Computers \& Security},
}
@InProceedings{Tau05,
author = {Tauman-Kalai, Y.},
title = {Smooth Projective Hashing and Two-Message Oblivious Transfer},
booktitle = {{Eurocrypt}'05},
year = {2005},
number = {3494},
series = {LNCS},
pages = {78--95},
publisher = {Springer},
}
@PhdThesis{Tsi97,
author = {Tsiounis, Y.},
title = {Efficient Electronic Cash: New Notions and Techniques},
year = {1997},
howpublished = {PhD thesis, Northeastern University},
institution = {Northeastern University},
}
@InProceedings{ZAW+10,
author = {Zhang, Y. and Au, M.-H. and Wong, D. and Huang, Q. and Mamoulis, N. and Cheung, D. and Yiu, S.-M.},
title = {Oblivious Transfer with Access Control: Realizing Disjunction without Duplication},
booktitle = {{Pairing}},
year = {2010},
number = {6847},
series = {LNCS},
pages = {96--115},
}
@InProceedings{ACD+12,
author = {Masayuki Abe and Melissa Chase and Bernardo David and Markulf Kohlweiss and Ryo Nishimaki and Miyako Ohkubo},
title = {Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions},
booktitle = {{Asiacrypt}},
year = {2012},
volume = {7658},
number = {7658},
series = {LNCS},
pages = {4--24},
publisher = {Springer},
}
@InProceedings{AFG+10,
author = {Masayuki Abe and Georg Fuchsbauer and Jens Groth and Kristiyan Haralambiev and Miyako Ohkubo},
title = {Structure-Preserving Signatures and Commitments to Group Elements},
booktitle = {{Crypto}},
year = {2010},
volume = {6223},
number = {6223},
series = {LNCS},
pages = {209--236},
publisher = {Springer},
}
@InProceedings{ABB10,
author = {Agrawal, S. and Boneh, D. and Boyen, X.},
title = {Efficient Lattice {(H)IBE} in the Standard Model},
booktitle = {{Eurocrypt}},
year = {2010},
volume = {6110},
series = {LNCS},
pages = {553--572},
publisher = {Springer},
}
@InProceedings{ABB+13,
author = {Carlos Aguilar-Melchor and Slim Bettaieb and Xavier Boyen and Laurent Fousse and Philippe Gaborit},
title = {{Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting}},
booktitle = {{Africacrypt}},
year = {2013},
volume = {7918},
series = {LNCS},
pages = {1--25},
publisher = {Springer},
}
@InProceedings{AP09,
author = {Alwen, J. and Peikert, C.},
title = {Generating shorter bases for hard random lattices},
booktitle = {{STACS}},
year = {2009},
volume = {3},
series = {LNCS},
pages = {75--86},
publisher = {Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany},
}
@InProceedings{AJL+12,
author = {Asharov, G. and Jain, A. and Lopez-Alt, A. and Tromer, E. and Vaikuntanathan, V. and Wichs, D.},
title = {Multiparty Computation with Low Communication, Computation and Interaction via Threshold {FHE}},
booktitle = {Eurocrypt},
year = {2012},
volume = {7237},
series = {LNCS},
pages = {483--501},
publisher = {Springer},
}
@InProceedings{ACJT00,
author = {Ateniese, Giuseppe and Camenisch, Jan and Joye, Marc and Tsudik, Gene},
title = {A practical and provably secure coalition-resistant group signature scheme},
booktitle = {Crypto},
year = {2000},
volume = {1880},
series = {LNCS},
pages = {255--270},
organization = {Springer},
publisher = {Springer},
}
@InProceedings{AT99,
author = {Ateniese, Giuseppe and Tsudik, Gene},
title = {Some open issues and new directions in group signatures},
booktitle = {Financial Cryptography},
year = {1999},
pages = {196--211},
organization = {Springer},
}
@Article{BHJ+15,
author = {B{\"o}hl, Florian and Hofheinz, Dennis and Jager, Tibor and Koch, Jessica and Striecks, Christoph},
title = {{Confined guessing: New signatures from standard assumptions}},
journal = {Journal of Cryptology},
year = {2015},
volume = {28},
number = {1},
pages = {176--208},
journaltitle = {Journal of Cryptology},
publisher = {Springer},
}
@InProceedings{BLL+15,
author = {Bai, Shi and Langlois, Adeline and Lepoint, Tancr\`ede and Stehl\'e, Damien and Steinfeld, Ron},
title = {Improved Security Proofs in Lattice-Based Cryptography: Using the {R\'enyi} Divergence Rather Than the Statistical Distance},
booktitle = {{Asiacrypt}},
year = {2015},
volume = {9452},
series = {LNCS},
publisher = {Springer},
}
@Article{Ban93,
author = {Banaszczyk, W.},
title = {New bounds in some transference theorems in the geometry of number},
year = {1993},
volume = {296},
pages = {625--635},
eid = {Springer},
journaltitle = {Mathematische Annalen},
}
@InProceedings{BP97,
author = {Niko Baric and Birgit Pfitzmann},
title = {{Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees}},
booktitle = {{Eurocrypt}},
year = {1997},
volume = {1233},
series = {LNCS},
pages = {480--494},
publisher = {Springer},
}
@InProceedings{BCC+09,
author = {Mira Belenkiy and Jan Camenisch and Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Hovav Shacham},
title = {{Randomizable Proofs and Delegatable Anonymous Credentials}},
booktitle = {{Crypto}},
year = {2009},
volume = {5677},
series = {LNCS},
pages = {108--125},
publisher = {Springer},
}
@InProceedings{BMW03,
author = {Bellare, Mihir and Micciancio, Daniele and Warinschi, Bogdan},
title = {Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions},
booktitle = {{Eurocrypt}},
year = {2003},
volume = {3376},
number = {2656},
series = {LNCS},
pages = {614--629},
publisher = {Springer},
}
@InProceedings{BSZ05,
author = {Bellare, Mihir and Shi, Haixia and Zhang, Chong},
title = {Foundations of group signatures: The case of dynamic groups},
booktitle = {{CT-RSA}},
year = {2005},
volume = {2656},
number = {3376},
series = {LNCS},
pages = {136--153},
publisher = {Springer},
}
@InProceedings{BCK+14,
author = {Benhamouda, Fabrice and Camenisch, Jan and Krenn, Stephan and Lyubashevsky, Vadim and Neven, Gregory},
title = {Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures},
booktitle = {{Asiacrypt}},
year = {2014},
number = {8873},
series = {LNCS},
pages = {551--572},
publisher = Springer,
}
@InProceedings{BKLP15,
author = {Fabrice Benhamouda and Stephan Krenn and Vadim Lyubashevsky and Krzysztof Pietrzak},
title = {Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings},
booktitle = {{ESORICS}},
year = {2015},
volume = {9326},
series = {LNCS},
pages = {305--325},
publisher = {Springer},
note = {to appear},
}
@Article{BKLP14,
author = {Fabrice Benhamouda and Stephan Krenn and Vadim Lyubashevsky and Krzysztof Pietrzak},
title = {{Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings}},
year = {2014},
volume = {2014},
pages = {889},
journaltitle = {{IACR} Cryptology ePrint Archive},
url = {https://ia.cr/2014/889},
}
@InProceedings{BB04,
author = {D. Boneh and X. Boyen},
title = {Efficient Selective-{ID} Secure Identity-Based Encryption Without Random Oracles},
booktitle = {{E}urocrypt},
year = {2004},
volume = {3027},
series = {LNCS},
pages = {223--238},
publisher = {Springer},
}
@InProceedings{BBS04,
author = {Boneh, Dan and Boyen, Xavier and Shacham, Hovav},
title = {Short group signatures},
booktitle = {{Crypto}},
year = {2004},
volume = {3152},
series = {LNCS},
pages = {41--55},
organization = {Springer},
}
@InProceedings{BS04,
author = {Boneh, Dan and Shacham, Hovav},
title = {Group signatures with verifier-local revocation},
booktitle = {{ACM-CCS}},
year = {2004},
pages = {168--177},
organization = {ACM},
}
@InProceedings{Boy10,
author = {Boyen, Xavier},
title = {Lattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more},
booktitle = {{PKC}},
year = {2010},
volume = {6056},
series = {LNCS},
pages = {499--517},
publisher = {Springer},
}
@InProceedings{BW07,
author = {X. Boyen and B. Waters},
title = {Full-Domain Subgroup Hiding and Constant-Size Group Signatures},
booktitle = {{PKC}},
year = {2007},
volume = {4450},
series = {LNCS},
pages = {1--15},
publisher = {Springer},
}
@InProceedings{BW06,
author = {X. Boyen and B. Waters},
title = {Compact Group Signatures Without Random Oracles},
booktitle = {{E}urocrypt},
year = {2006},
volume = {4004},
series = {LNCS},
pages = {427--444},
publisher = {Springer},
}
@Article{BK10,
author = {Zvika Brakerski and Yael Tauman Kalai},
title = {A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model},
year = {2010},
volume = {2010},
pages = {86},
bibsource = {DBLP, http://dblp.uni-trier.de},
ee = {https://ia.cr/2010/086},
journaltitle = {IACR Cryptology ePrint Archive},
}
@InProceedings{BLP+13,
author = {Brakerski, Z. and Langlois, A. and Peikert, C. and Regev, O. and Stehl{\'e}, D.},
title = {On the classical hardness of learning with errors},
booktitle = {{STOC}},
year = {2013},
pages = {575--584},
publisher = {ACM},
}
@InProceedings{BPVY00,
author = {Brickell, E. and Pointcheval, D. and Vaudenay, S. and Yung, M.},
title = {Design Validations for Discrete Logarithm Based Signature Schemes},
booktitle = {{PKC}},
year = {2000},
volume = {1751},
series = {LNCS},
pages = {276--292},
publisher = {Springer},
}
@InProceedings{CDHK15,
author = {Camenisch, J. and Dubovitskaya, M. and Haralambiev, K. and Kohlweiss, M.},
title = {Composable and Modular Anonymous Credentials: Definitions and Practical Constructions},
booktitle = {{Asiacrypt}},
year = {2015},
series = {LNCS},
publisher = {Springer},
url = {https://ia.cr/2015/580},
}
@InProceedings{CG08,
author = {Camenisch, Jan and Gross, Thomas},
title = {Efficient attributes for anonymous credentials},
booktitle = {{ACM-CCS}},
year = {2008},
pages = {345--356},
publisher = {ACM},
}
@InProceedings{CHL05a,
author = {Camenisch, Jan and Hohenberger, Susan and Lysyanskaya, Anna},
title = {Compact e-cash},
booktitle = {{Eurocrypt}},
year = {2005},
number = {3494},
series = {LNCS},
pages = {302--321},
publisher = {Springer},
}
@InProceedings{CKY09,
author = {Camenisch, Jan and Kiayias, Aggelos and Yung, Moti},
title = {On the Portability of Generalized {Schnorr} Proofs},
booktitle = {{Eurocrypt}},
year = {2009},
number = {5479},
series = {LNCS},
pages = {425--442},
publisher = {Springer},
}
@InProceedings{CKL+15,
author = {Camenisch, J. and Krenn, S. and Lehmann, A. and Mikkelsen, G.-L. and Neven, G. and Pedersen, M.-0.},
title = {Formal Treatment of Privacy-Enhancing Credential Systems},
booktitle = {{SAC}},
year = {2015},
series = {LNCS},
pages = {3--24},
publisher = {Springer},
url = {https://ia.cr/2014/708},
}
@InProceedings{CL02b,
author = {Jan Camenisch and Anna Lysyanskaya},
title = {Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials},
booktitle = {{Crypto}},
year = {2002},
volume = {2442},
series = {LNCS},
pages = {61--76},
publisher = {Springer},
}
@InProceedings{CL01,
author = {Camenisch, Jan and Lysyanskaya, Anna},
title = {An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation},
booktitle = {{Eurocrypt}},
year = {2001},
number = {2045},
series = {LNCS},
pages = {93--118},
publisher = {Springer},
}
@InProceedings{CNR12,
author = {J. Camenisch and G. Neven and M. R{\"u}ckert},
title = {Fully Anonymous Attribute Tokens from Lattices},
booktitle = {{SCN}},
year = {2012},
volume = {7485},
series = {LNCS},
pages = {57--75},
publisher = {Springer},
}
@InProceedings{CHKP10,
author = {Cash, D. and Hofheinz, D. and Kiltz, E. and Peikert, C.},
title = {Bonsai Trees, or How to Delegate a Lattice Basis},
booktitle = {{Eurocrypt}},
year = {2010},
volume = {6110},
series = {LNCS},
pages = {523--552},
publisher = {Springer},
}
@InProceedings{CLY09,
author = {Julien Cathalo and Beno\^it Libert and Moti Yung},
title = {{Group Encryption: Non-Interactive Realization in the Standard Model}},
booktitle = {{Asiacrypt}},
year = {2009},
number = {5912},
series = {LNCS},
pages = {179--196},
publisher = {Springer},
}
@InProceedings{CMZ14,
author = {Melissa Chase and Sarah Meiklejohn and Greg Zaverucha},
title = {Algebraic MACs and Keyed-Verification Anonymous Credentials},
booktitle = {{ACM-CCS}},
year = {2014},
pages = {1205--1216},
publisher = {ACM},
}
@Article{Cha85,
author = {Chaum, David},
title = {{Security without Identification: Transactions System to Make Big Brother Obsolete}},
year = {1985},
volume = {28},
number = {10},
pages = {1030--1044},
journaltitle = {Communications of the {ACM}},
}
@InProceedings{CVH91,
author = {Chaum, David and van Heyst, Eug{\`e}ne},
title = {Group signatures},
booktitle = {{Eurocrypt}},
year = {1991},
volume = {547},
series = {LNCS},
pages = {257--265},
organization = {Springer},
publisher = {Springer},
}
@InProceedings{CVH91a,
author = {Chaum, David and Van Heyst, Eug{\`e}ne},
title = {Group signatures},
booktitle = {{Eurocrypt}},
year = {1991},
volume = {547},
series = {LNCS},
pages = {257--265},
organization = {Springer},
publisher = {Springer},
}
@InProceedings{Dam00,
author = {Damg{\aa}rd, I.},
title = {Efficient Concurrent Zero-Knowledge in the Auxiliary String Model},
booktitle = {{Eurocrypt}},
year = {2000},
volume = {1807},
series = {LNCS},
pages = {418--430},
publisher = {Springer},
edition = {Springer},
}
@InProceedings{DHKT08,
author = {Damg{\aa}rd, I. and Hofheinz, D. and Kiltz, E. and Thorbek, R.},
title = {Public-key encryption with non-interactive opening},
booktitle = {{CT-RSA}},
year = {2008},
volume = {4964},
series = {LNCS},
pages = {239--255},
publisher = {Springer},
edition = {Springer},
}
@InProceedings{DT07,
author = {Damg{\aa}rd, I. and Thorbek, R.},
title = {Non-interactive Proofs for Integer Multiplication},
booktitle = {{Eurocrypt}},
year = {2007},
volume = {4515},
series = {LNCS},
pages = {412--429},
publisher = {Springer},
edition = {Springer},
}
@InProceedings{DP06,
author = {Delerabl{\'e}e, C{\'e}cile and Pointcheval, David},
title = {Dynamic fully anonymous short group signatures},
booktitle = {VietCrypt},
year = {2006},
volume = {4341},
number = {4341},
series = {LNCS},
pages = {193--210},
publisher = {Springer},
}
@Article{DZ09,
author = {Delgrossi, Luca and Zhang, Tao},
title = {Dedicated Short-Range Communications},
year = {2009},
pages = {44--51},
journaltitle = {Vehicle Safety Communications: Protocols, Security, and Privacy},
publisher = {Wiley Online Library},
}
@InProceedings{ELL+15,
author = {Martianus Frederic Ezerman and Hyung Tae Lee and San Ling and Khoa Nguyen and Huaxiong Wang},
title = {A Provably Secure Group Signature Scheme from Code-Based Assumptions},
booktitle = {{Asiacrypt}'15},
year = {2015},
volume = {9452},
series = {LNCS},
pages = {260--285},
publisher = {Springer},
howpublished = {Cryptology ePrint Archive, Report 2015/479},
}
@InProceedings{FS86,
author = {Fiat, Amos and Shamir, Adi},
title = {How To Prove Yourself: Practical Solutions to Identification and Signature Problems},
booktitle = {Crypto},
year = {1986},
editor = {Odlyzko, Andrew M.},
pages = {186--194},
publisher = {Springer},
isbn = {978-3-540-47721-1},
}
@InProceedings{GLF+10,
author = {Galindo, D. and Libert, B. and Fischlin, M. and Fuchsbauer, G. and Lehmann, A. and Manulis, M. and Schr\"oder, D.},
title = {Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions},
booktitle = {{Africacrypt}},
year = {2010},
volume = {6055},
series = {LNCS},
pages = {333--350},
publisher = {Springer},
edition = Springer,
}
@InProceedings{Gen09,
author = {Gentry, C.},
title = {Fully homomorphic encryption using ideal lattices},
booktitle = {{STOC}},
year = {2009},
pages = {169--178},
publisher = {ACM},
}
@InProceedings{GPV08,
author = {Gentry, C. and Peikert, C. and Vaikuntanathan, V.},
title = {Trapdoors for hard lattices and new cryptographic constructions},
booktitle = {{STOC}},
year = {2008},
pages = {197--206},
publisher = {{ACM}},
}
@InProceedings{GMR85,
author = {Goldwasser, Shafi and Micali, Silvio and Rackoff, Charles},
title = {The knowledge complexity of interactive proof-systems},
booktitle = {{STOC}},
year = {1985},
pages = {291--304},
organization = {ACM},
publisher = {{ACM}},
}
@InProceedings{GVW15,
author = {Gorbunov, S. and Vaikuntanathan, V. and Wee, H.},
title = {Predicate Encryption for Circuits from {LWE}},
booktitle = {{Crypto}},
year = {2015},
number = {9216},
series = {LNCS},
pages = {503--523},
publisher = {Springer},
}
@InProceedings{GVW13,
author = {Gorbunov, S. and Vaikuntanathan, V. and Wee, H.},
title = {Attribute-based encryption for circuits},
booktitle = {{STOC}},
year = {2013},
pages = {545--554},
publisher = {ACM},
}
@InProceedings{GKV10,
author = {Gordon, S Dov and Katz, Jonathan and Vaikuntanathan, Vinod},
title = {A group signature scheme from lattice assumptions},
booktitle = {{Asiacrypt}},
year = {2010},
volume = {2647},
series = {LNCS},
pages = {395--412},
publisher = {Springer},
}
@InProceedings{GH08,
author = {Matthew Green and Susan Hohenberger},
title = {{Universally Composable Adaptive Oblivious Transfer}},
booktitle = {{Asiacrypt}},
year = {2008},
number = {5350},
series = {LNCS},
pages = {179--197},
publisher = {Springer},
}
@InProceedings{Gro07,
author = {J. Groth},
title = {Fully Anonymous Group Signatures without Random Oracles},
booktitle = {{Asiacrypt}},
year = {2007},
volume = {4833},
series = {LNCS},
pages = {164--180},
publisher = {Springer},
}
@InProceedings{GS08,
author = {J. Groth and A. Sahai},
title = {Efficient Non-interactive Proof Systems for Bilinear Groups},
booktitle = {{Eurocrypt}},
year = {2008},
volume = {4965},
series = {LNCS},
pages = {415--432},
publisher = {Springer},
}
@InProceedings{HW09,
author = {Hohenberger, S. and Waters, B.},
title = {Short and Stateless Signatures from the {RSA} Assumption},
booktitle = {{Crypto}},
year = {2009},
volume = {5677},
series = {LNCS},
pages = {654--670},
publisher = {Springer},
}
@InProceedings{JKPT12,
author = {Jain, A. and Krenn, S. and Pietrzak, K. and Tentes, A.},
title = {Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise},
booktitle = {{Asiacrypt}},
year = {2012},
volume = {7658},
series = {LNCS},
pages = {663--680},
publisher = {Springer},
}
@InProceedings{KTX08,
author = {Kawachi, A. and Tanaka, K. and Xagawa, K.},
title = {Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems},
booktitle = {{Asiacrypt}},
year = {2008},
volume = {5350},
series = {LNCS},
pages = {372--389},
publisher = {Springer},
}
@InProceedings{KTY07,
author = {Aggelos Kiayias and Yiannis Tsiounis and Moti Yung},
title = {Group Encryption},
booktitle = {{Asiacrypt}},
year = {2007},
number = {4833},
series = {LNCS},
pages = {181--199},
publisher = {Springer},
}
@Article{KY06,
author = {Kiayias, Aggelos and Yung, Moti},
title = {Secure scalable group signature with dynamic joins and separable authorities},
year = {2006},
volume = {1},
number = {1},
pages = {24--45},
journaltitle = {International Journal of Security and Networks},
publisher = {Inderscience},
}
@InProceedings{KY05,
author = {Kiayias, Aggelos and Yung, Moti},
title = {Group Signatures with Efficient Concurrent Join},
booktitle = {{Eurocrypt}},
year = {2005},
number = {3494},
series = {LNCS},
pages = {198--214},
publisher = {Springer},
}
@InProceedings{LLLS13,
author = {Laguillaumie, Fabien and Langlois, Adeline and Libert, Beno{\^\i}t and Stehl{\'e}, Damien},
title = {Lattice-based group signatures with logarithmic signature size},
booktitle = {{Asiacrypt}},
year = {2013},
volume = {8270},
series = {LNCS},
pages = {41--61},
publisher = {Springer},
}
@InProceedings{LLNW14,
author = {Langlois, Adeline and Ling, San and Nguyen, Khoa and Wang, Huaxiong},
title = {{Lattice-Based Group Signature Scheme with Verifier-Local Revocation}},
booktitle = {{PKC}},
year = {2014},
volume = {8383},
series = {LNCS},
pages = {345--361},
publisher = {Springer},
}
@InProceedings{LSS14,
author = {Langlois, Adeline and Stehl\'e, Damien and Steinfeld, Ron},
title = {{GGHLite}: More Efficient Multilinear Maps from Ideal Lattices},
booktitle = {{Eurocrypt}},
year = {2014},
volume = {8441},
series = {LNCS},
pages = {239--256},
publisher = {Springer},
}
@InProceedings{LLNW16,
author = {Libert, B. and Ling, S. and Nguyen, K. and Wang, H.},
title = {{Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-size Ring Signatures and Group Signatures Without Trapdoors}},
booktitle = {{Eurocrypt}},
year = {2016},
volume = {9666},
series = {LNCS},
pages = {1--31},
publisher = {Springer},
}
@InProceedings{LPY15,
author = {Beno\^{\i}t Libert and Thomas Peters and Moti Yung},
title = {Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions},
booktitle = {{Crypto}},
year = {2015},
volume = {9216},
series = {LNCS},
pages = {296--316},
publisher = {Springer},
}
@InProceedings{LNSW13,
author = {Ling, San and Nguyen, Khoa and Stehl{\'e}, Damien and Wang, Huaxiong},
title = {{Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications}},
booktitle = {{PKC}},
year = {2013},
volume = {7778},
pages = {107--124},
publisher = {Springer},
}
@InProceedings{LAN02,
author = {Helger Lipmaa and N. Asokan and Valtteri Niemi},
title = {{Secure Vickrey Auctions without Threshold Trust}},
booktitle = {Financial Cryptography},
year = {2002},
volume = {2357},
series = {LNCS},
pages = {87--101},
publisher = {Springer},
}
@InProceedings{Lyu08,
author = {Vadim Lyubashevsky},
title = {Lattice-Based Identification Schemes Secure Under Active Attacks},
booktitle = {{PKC}},
year = {2008},
volume = {4939},
series = {LNCS},
pages = {162--179},
publisher = {Springer},
}
@InProceedings{LPR10,
author = {V. Lyubashevsky and C. Peikert and O. Regev},
title = {On Ideal Lattices and Learning with Errors over Rings},
booktitle = {{Eurocrypt}},
year = {2010},
volume = {6110},
series = {LNCS},
pages = {1--23},
publisher = {Springer},
}
@InProceedings{MP12,
author = {Micciancio, D. and Peikert, C.},
title = {Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller},
booktitle = {{Eurocrypt}},
year = {2012},
volume = {7237},
series = {LNCS},
pages = {700--718},
publisher = {Springer},
}
@InProceedings{MV03,
author = {Micciancio, D. and Vadhan, S.},
title = {Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice Problems and More},
booktitle = {{Crypto}},
year = {2003},
volume = {2729},
series = {LNCS},
pages = {282--298},
publisher = {Springer},
}
@InProceedings{NZZ15,
author = {Nguyen, Phong Q and Zhang, Jiang and Zhang, Zhenfeng},
title = {Simpler Efficient Group Signatures from Lattices},
booktitle = {{PKC}},
year = {2015},
volume = {9020},
series = {LNCS},
pages = {401--426},
publisher = {Springer},
}
@InProceedings{Pei09,
author = {Peikert, C.},
title = {Public-key cryptosystems from the worst-case shortest vector problem},
booktitle = {{STOC}},
year = {2009},
pages = {333--342},
publisher = {ACM},
}
@InProceedings{PV08,
author = {Peikert, C. and Vaikuntanathan, V.},
title = {Non-interactive Statistical Zero-Knowledge Proofs for Lattice Problems},
booktitle = {{Crypto}},
year = {2008},
volume = {5157},
series = {LNCS},
pages = {536--553},
publisher = {Springer},
}
@InProceedings{Reg05,
author = {Regev, O.},
title = {On lattices, learning with errors, random linear codes, and cryptography},
booktitle = {{STOC}},
year = {2005},
pages = {84--93},
publisher = {{ACM}},
}
@InProceedings{RST01,
author = {Rivest, Ronald L. and Shamir, Adi and Tauman, Yael},
title = {How to Leak a Secret},
booktitle = {{Asiacrypt}},
year = {2001},
volume = {2248},
series = {LNCS},
pages = {552--565},
publisher = {Springer},
}
@Article{Ste96,
author = {Stern, Jacques},
title = {A new paradigm for public key identification},
year = {1996},
volume = {42},
number = {6},
pages = {1757--1768},
journaltitle = {IEEE Transactions on Information Theory},
publisher = {IEEE},
}
@InProceedings{XXW13,
author = {Xie, X. and Xue, R. and Wang, M.},
title = {Zero Knowledge Proofs from {Ring-LWE}},
booktitle = {{CANS}},
year = {2013},
volume = {8257},
series = {LNCS},
pages = {57--73},
publisher = {Springer},
}
@Book{BSS05,
title = {Advances in elliptic curve cryptography},
publisher = {Cambridge University Press},
year = {2005},
author = {Blake, Ian F and Seroussi, Gadiel and Smart, Nigel P},
volume = {317},
}
@InProceedings{Che06,
author = {Jung Hee Cheon},
title = {Security Analysis of the Strong Diffie-Hellman Problem},
booktitle = {Eurocrypt},
year = {2006},
publisher = {Springer},
volume = {4004},
series = {LNCS},
}
@Misc{NIS17,
author = {NIST},
title = {{NIST post-quantum competition. Round 1.}},
year = {2017},
note = {\url{https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Round-1-Submissions}},
}
@Misc{Wun10,
author = {Thomas Wunderer},
title = {Lattice Challenge},
year = {2010},
note = {\url{https://www.latticechallenge.org/index.php}},
}
@InProceedings{HK17,
author = {Herold, Gottfried and Kirshanova, Elena},
title = {Improved Algorithms for the Approximate k-List Problem in {E}uclidean Norm},
booktitle = {PKC'17},
year = {2017},
pages = {16--40},
publisher = {Springer},
isbn = {978-3-662-54365-8},
}
@InProceedings{ADRS15,
author = {Aggarwal, Divesh and Dadush, Daniel and Regev, Oded and Stephens-Davidowitz, Noah},
title = {{Solving the Shortest Vector Problem in $2^n$ Time Using Discrete Gaussian Sampling}},
booktitle = {STOC},
year = {2015},
pages = {733--742},
publisher = {ACM},
doi = {10.1145/2746539.2746606},
isbn = {978-1-4503-3536-2},
keywords = {discrete Gaussian, lattices, shortest vector problem},
url = {http://doi.acm.org/10.1145/2746539.2746606},
}
@InProceedings{Jou00,
author = {Joux, Antoine},
title = {A One Round Protocol for Tripartite Diffie--Hellman},
booktitle = {Algorithmic Number Theory},
year = {2000},
editor = {Bosma, Wieb},
pages = {385--393},
publisher = {Springer},
isbn = {978-3-540-44994-2},
}
@InProceedings{BF01,
author = {Boneh, Dan and Franklin, Matt},
title = {Identity-Based Encryption from the Weil Pairing},
booktitle = {Crypto},
year = {2001},
editor = {Kilian, Joe},
pages = {213--229},
publisher = {Springer},
isbn = {978-3-540-44647-7},
}
@InProceedings{Wat05,
author = {Waters, Brent},
title = {Efficient Identity-Based Encryption Without Random Oracles},
booktitle = {Eurocrypt},
year = {2005},
editor = {Cramer, Ronald},
pages = {114--127},
publisher = {Springer},
isbn = {978-3-540-32055-5},
}
@InProceedings{KSS08,
author = {Kachisa, Ezekiel J. and Schaefer, Edward F. and Scott, Michael},
title = {Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field},
booktitle = {Pairing-Based Cryptography -- Pairing},
year = {2008},
editor = {Galbraith, Steven D. and Paterson, Kenneth G.},
pages = {126--135},
publisher = {Springer},
isbn = {978-3-540-85538-5},
}
@InProceedings{BN06,
author = {Barreto, Paulo S. L. M. and Naehrig, Michael},
title = {Pairing-Friendly Elliptic Curves of Prime Order},
booktitle = {Selected Areas in Cryptography},
year = {2006},
editor = {Preneel, Bart and Tavares, Stafford},
pages = {319--331},
publisher = {Springer},
isbn = {978-3-540-33109-4},
}
@Article{BD18,
author = {Barbulescu, Razvan and Duquesne, Sylvain},
title = {{Updating Key Size Estimations for Pairings}},
journal = {Journal of Cryptology},
year = {2018},
pages = {1--39},
day = {29},
doi = {10.1007/s00145-018-9280-5},
url = {https://doi.org/10.1007/s00145-018-9280-5},
}
@InProceedings{KB16,
author = {Kim, Taechan and Barbulescu, Razvan},
title = {Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case},
booktitle = {Crypto},
year = {2016},
editor = {Robshaw, Matthew and Katz, Jonathan},
pages = {543--571},
publisher = {Springer},
isbn = {978-3-662-53018-4},
}
@Misc{BGdMM05,
author = {Lucas Ballard and Matthew Green and Breno de Medeiros and Fabian Monrose},
title = {Correlation-Resistant Storage via Keyword-Searchable Encryption},
howpublished = {Cryptology ePrint Archive, Report 2005/417},
year = {2005},
note = {\url{https://ia.cr/2005/417}},
}
@Article{KL11,
author = {Kidron, Dafna and Lindell, Yehuda},
title = {Impossibility Results for Universal Composability in<69>Public-Key Models and with Fixed Inputs},
journal = {Journal of Cryptology},
year = {2011},
volume = {24},
number = {3},
pages = {517--544},
issn = {1432-1378},
day = {01},
doi = {10.1007/s00145-010-9069-7},
url = {https://doi.org/10.1007/s00145-010-9069-7},
}
@InProceedings{CKL03,
author = {Canetti, Ran and Kushilevitz, Eyal and Lindell, Yehuda},
title = {On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions},
booktitle = {Eurocrypt},
year = {2003},
editor = {Biham, Eli},
pages = {68--86},
publisher = {Springer},
isbn = {978-3-540-39200-2},
}
@Article{CKL06,
author = {Canetti, Ran and Kushilevitz, Eyal and Lindell, Yehuda},
title = {On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions},
journal = {Journal of Cryptology},
year = {2006},
volume = {19},
number = {2},
pages = {135--167},
issn = {1432-1378},
day = {01},
doi = {10.1007/s00145-005-0419-9},
url = {https://doi.org/10.1007/s00145-005-0419-9},
}
@InProceedings{Yao86,
author = {Yao, Andrew Chi-Chih},
title = {How to generate and exchange secrets},
booktitle = {FOCS},
year = {1986},
}
@InProceedings{LP07,
author = {Lindell, Yehuda and Pinkas, Benny},
title = {An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries},
booktitle = {Eurocrypt},
year = {2007},
editor = {Naor, Moni},
pages = {52--78},
publisher = {Springer},
isbn = {978-3-540-72540-4},
}
@InProceedings{Coo71,
author = {Cook, Stephen A.},
title = {The Complexity of Theorem-proving Procedures},
booktitle = {Proceedings of the Third Annual ACM Symposium on Theory of Computing},
year = {1971},
series = {STOC '71},
pages = {151--158},
publisher = {ACM},
doi = {10.1145/800157.805047},
url = {http://doi.acm.org/10.1145/800157.805047},
}
@InProceedings{MSS17,
author = {Menezes, Alfred and Sarkar, Palash and Singh, Shashank},
title = {{Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-Based Cryptography}},
booktitle = {Paradigms in Cryptology -- Mycrypt. Malicious and Exploratory Cryptology},
year = {2017},
editor = {Phan, Rapha{\"e}l C.-W. and Yung, Moti},
pages = {83--108},
publisher = {Springer},
isbn = {978-3-319-61273-7},
}
@Article{Gil77,
author = {John Gill},
title = {{Computational Complexity of Probabilistic Turing Machines}},
journal = {SIAM J. on Computing},
year = {1977},
volume = {6},
number = {4},
pages = {675--695},
doi = {10.1137/0206049},
eprint = {https://doi.org/10.1137/0206049},
url = {
https://doi.org/10.1137/0206049
},
}
@Misc{Rab60,
author = {Rabin, Michael Oser},
title = {Degree of difficulty of computing a function and a partial ordering of recursive sets},
howpublished = {Technical Report 2, {Hebrew University of Jerusalem}},
year = {1960},
publisher = {Hebrew University},
}
@Book{AB09,
title = {Computational Complexity: A Modern Approach},
publisher = {Cambridge University Press},
year = {2009},
author = {Arora, Sanjeev and Barak, Boaz},
edition = {1st},
isbn = {0521424267, 9780521424264},
}
@Book{KL07,
title = {Introduction to Modern Cryptography (Chapman \& Hall/Crc Cryptography and Network Security Series)},
publisher = {Chapman \& Hall/CRC},
year = {2007},
author = {Katz, Jonathan and Lindell, Yehuda},
isbn = {1584885513},
}
@InProceedings{BR93,
author = {Bellare, Mihir and Rogaway, Phillip},
title = {{Random Oracles Are Practical: A Paradigm for Designing Efficient Protocols}},
booktitle = {CCS},
year = {1993},
publisher = {ACM},
doi = {10.1145/168588.168596},
isbn = {0-89791-629-8},
url = {http://doi.acm.org/10.1145/168588.168596},
}
@InProceedings{CGH98,
author = {Canetti, Ran and Goldreich, Oded and Halevi, Shai},
title = {The Random Oracle Methodology, Revisited},
booktitle = {STOC},
year = {1998},
volume = {45},
publisher = {ACM},
doi = {10.1145/1008731.1008734},
issn = {0004-5411},
issue_date = {July 2004},
keywords = {CS-proofs, Correlation intractability, cryptography, diagonalization, the random-oracle model},
url = {http://doi.acm.org/10.1145/1008731.1008734},
}
@InProceedings{LLM+17,
author = {Libert, Beno{\^i}t and Ling, San and Mouhartem, Fabrice and Nguyen, Khoa and Wang, Huaxiong},
title = {Adaptive Oblivious Transfer with Access Control from Lattice Assumptions},
booktitle = {Asiacrypt},
year = {2017},
editor = {Takagi, Tsuyoshi and Peyrin, Thomas},
pages = {533--563},
publisher = {Springer},
isbn = {978-3-319-70694-8},
}
@InProceedings{LMPY16,
author = {Libert, Beno\^{\i}t and Mouhartem, Fabrice and Peters, Thomas and Yung, Moti},
title = {Practical "Signatures with Efficient Protocols" from Simple Assumptions},
booktitle = {AsiaCCS},
year = {2016},
pages = {511--522},
publisher = {ACM},
doi = {10.1145/2897845.2897898},
isbn = {978-1-4503-4233-9},
keywords = {anonymous credentials, efficient privacy-enhancing protocols, group signatures, privacy, signature, signature with efficient protocols, simple cryptographic assumptions},
url = {http://doi.acm.org/10.1145/2897845.2897898},
}
@Book{Gol04,
title = {Foundations of Cryptography: Volume 2, Basic Applications},
publisher = {Cambridge University Press},
year = {2004},
author = {Goldreich, Oded},
isbn = {0521830842},
}
@InProceedings{CF01,
author = {Canetti, Ran and Fischlin, Marc},
title = {Universally Composable Commitments},
booktitle = {Crypto},
year = {2001},
pages = {19--40},
publisher = {Springer},
isbn = {978-3-540-44647-7},
}
@InProceedings{ADS15,
author = {Aggarwal, Divesh and Dadush, Daniel and Stephens-Davidowitz, Noah},
title = {{Solving the Closest Vector Problem in $2^n$ Time --- The Discrete Gaussian Strikes Again!}},
booktitle = {FOCS},
publisher = {ACM},
year = {2015},
url = {https://arxiv.org/abs/1504.01995},
}
@InProceedings{AFG14,
author = {Albrecht, Martin R. and Fitzpatrick, Robert and G{\"o}pfert, Florian},
title = {{On the Efficacy of Solving LWE by Reduction to Unique-SVP}},
booktitle = {ICISC 2013},
year = {2014},
pages = {293--310},
address = {Cham},
publisher = {Springer},
}
@InProceedings{Blu86,
author = {Blum, Manuel},
title = {How to prove a theorem so no one else can claim it},
booktitle = {International Congress of Mathematicians},
year = {1986},
pages = {1444--1451},
}
@Unpublished{Dam10,
author = {Damg{\aa}rd, Ivan},
title = {On {$\Sigma$}-protocols},
note = {Lecture Notes. \url{http://www.daimi.au.dk/~ivan/Sigma.pdf}},
month = mar,
year = {2010},
url = {http://www.daimi.au.dk/%7Eivan/Sigma.pdf},
}
@InProceedings{Blu81,
author = {Blum, Manuel},
title = {{Coin Flipping by Telephone}},
booktitle = {Crypto},
year = {1981},
publisher = {Springer},
pages = {11--15},
}
@InProceedings{GOS06,
author = {Groth, Jens and Ostrovsky, Rafail and Sahai, Amit},
title = {{Perfect Non-interactive Zero Knowledge for NP}},
booktitle = {Eurocrypt},
year = {2006},
}
@Unpublished{Sho06,
author = {Shoup, Victor},
title = {{Sequences of Games: A Tool for Taming Complexity in Security Proofs}},
note = {Tutorial. \url{http://www.shoup.net/papers/games.pdf}},
month = jan,
year = {2006},
}
@InProceedings{Ped91,
author = {Pedersen, Torben Pryds},
title = {{Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing}},
booktitle = {Crypto},
year = {1991},
publisher = {Springer},
pages = {129--140},
}
@InProceedings{Lyu09,
author = {Lyubashevsky, Vadim},
title = {{Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures}},
booktitle = {Asiacrypt},
year = {2009},
publisher = {Springer},
pages = {598--616},
}
@InProceedings{dPLNS17,
author = {del Pino, Rafa<66>l and Lyubashevsky, Vadim and Neven, Gregory and Seiler, Gregory},
title = {{Practical Quantum-Safe Voting from Lattices}},
booktitle = {CCS},
year = {2017},
}
@InProceedings{LLNW17,
author = {Libert, Beno<6E>t and Ling, San and Nguyen, Khoa and Wang, Huaxiong},
title = {{Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash}},
booktitle = {Asiacrypt},
year = {2017},
publisher = {Springer},
series = {LNCS},
pages = {304--335},
}
@InProceedings{Ajt96,
author = {Ajtai, Mikl<6B>s},
title = {{Generating Hard Instances of Lattice Problems}},
booktitle = {STOC},
year = {1996},
editor = {ACM},
pages = {99--108},
}
@InProceedings{FS90,
author = {Feige, Uriel and Shamir, Adi},
title = {{Witness Indistinguishable and Witness Hiding Protocols}},
booktitle = {STOC},
year = {1990},
editor = {ACM},
pages = {416--426},
}
@PhdThesis{Mer79,
author = {Merkle, Ralph Charles},
title = {Secrecy, Authentication, and Public Key Systems},
school = {Stanford University},
year = {1979},
month = jun,
note = {\url{http://www.merkle.com/papers/Thesis1979.pdf}},
}
@InProceedings{Dam89,
author = {Damg{\aa}rd, Ivan},
title = {{A Design Principle for Hash Functions}},
booktitle = {Crypto},
year = {1989},
publisher = {Springer},
pages = {416--427},
}
@InProceedings{LMN16,
author = {Libert, Beno<6E>t and Mouhartem, Fabrice and Nguyen, Khoa},
title = {{A Lattice-Based Group Signature Scheme with Message-Dependent Opening}},
booktitle = {ACNS},
year = {2016},
pages = {137--155},
publisher = {Springer},
}
@InProceedings{BCC+16,
author = {Jonathan Bootle and Andrea Cerulli and Pyrros Chaidos and Essam Ghadafi and Jens Groth},
title = {{Foundations of Fully Dynamic Group Signatures}},
booktitle = {ACNS},
year = {2016},
series = {LNCS},
pages = {117--136},
publisher = {Springer},
}
@InProceedings{JR13,
author = {Jutla, Charanjit and Roy, Arnab},
title = {{Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces}},
booktitle = {Asiacrypt},
year = {2013},
series = {LNCS},
pages = {1--20},
publisher = {Springer},
}
@InProceedings{LPJY14,
author = {Libert, Benoît and Peters, Thomas and Joye, Marc and Yung, Moti},
title = {{Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures}},
booktitle = {Eurocrypt},
year = {2014},
series = {LNCS},
pages = {514--532},
publisher = {Springer},
}
@InProceedings{KW15,
author = {Kiltz, Eike and Wee, Hoeteck},
title = {{Quasi-Adaptive NIZK for Linear Subspaces Revisited}},
booktitle = {Eurocrypt},
year = {2015},
}
@InProceedings{KW03,
author = {Katz, Jonathan and Wang, Nan},
title = {Efficiency improvements for signature schemes with tight security reductions},
booktitle = {CCS},
year = {2003},
pages= {155--164},
publisher={ACM},
}
@InProceedings{LPJY13,
author = {Libert, Beno<6E>t and Peters, Thomas and Joye, Marc and Yung, Moti},
title = {{Linearly Homomorphic Structure-Preserving Signatures and Their Applications}},
booktitle = {Crypto},
year = {2013},
series = {LNCS},
pages = {289--307},
publisher = {Springer},
}
@PhdThesis{Cra96,
author = {Cramer, Ronald},
title = {{Modular Design of Secure, yet Practical Cryptographic Protocols}},
school = {University of Amsterdam},
year = {1996},
}
@InProceedings{GMY03,
author={Garay, Julien and MacKenzie, Philip and Yang, Ke},
title={{Strengthening Zero-Knowledge Protocols Using Signatures}},
booktitle={Eurocrypt},
year={2003},
series = {LNCS},
pages={177--194},
publisher = {Springer},
}
@Article{BBKS07,
author = {Bellare, M. and Boldyreva, A. and Kurosawa, K. and Staddon, J.},
title = {{Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security}},
journal = {IEEE Trans. on Information Theory},
year = {2007},
volume = {53},
number = {11},
pages = {3927--3943},
}
@InProceedings{CS98,
title={{A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack}},
author = {Cramer, Ronald and Shoup, Victor},
booktitle = {Crypto},
year={1998},
pages = {13--25},
}
@InProceedings{SG98,
title={{Securing Threshold Cryptosystems against Chosen Ciphertext Attack}},
author = {Shoup, Victor and Gennaro, Rosario},
booktitle = {Eurocrypt},
year={1998},
pages = {1--16},
}
@InProceedings{CDM00,
title={{Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions}},
author = {Cramer, Ronald and Damg{\aa}rd, Ivan and MacKenzie, Philip},
booktitle = {PKC},
year={2000},
pages = {354--372},
}
@Article{PS00,
author = {Pointcheval, David and Stern, J.},
title = {{{Security Arguments for Digital Signatures and Blind Signatures}}},
journal = {Journal of Cryptology},
year = {2000},
volume = {13},
number = {3},
pages = {361--396},
month = jun,
}
@InProceedings{BCN+10,
author = {Patrik Bichsel and Jan Camenisch and Gregory Neven and Smart, Nigel P. and Bogdan Warinschi},
title = {{{Get Shorty via Group Signatures without Encryption}}},
booktitle = {SCN},
year = {2010},
series = {LNCS},
pages = {381--398},
publisher = {Springer},
}
@InProceedings{LRSW99,
author = {Lysyanskaya, Anna and Rivest, R. L. and Sahai, Amit and Wolf, Stefan},
title = {{{Pseudonym Systems}}},
booktitle = {SAC},
year = {1999},
pages = {184--199},
}
@InProceedings{PS16,
author = {Poincheval, David and Sanders, Olivier},
title = {{Short Randomizable Signatures}},
booktitle = {CT-RSA},
year = {2016},
series = {LNCS},
pages = {111--126},
publisher = {Springer},
}
@InProceedings{LNWX17,
author = {Ling, San and Nguyen, Khoa and Wang, Huaxiong and Xu, Yahong},
title = {{Lattice-Based Group Signatures: Achieving Full Dynamicity (and Deniability) with Ease}},
booktitle = {ACNS},
year = {2017},
series = {LNCS},
publisher = {Springer},
}
@InProceedings{NFHF09,
author = {Nakanishi, Toru and Fujii, Hiroki and Hira, Yuta and Funabiki, Nobuo},
title = {{Revocable Group Signature Schemes with Constant Costs for Signing and Verifying}},
booktitle = {{PKC}},
year = {2009},
series = {LNCS},
pages = {463--480},
publisher = {Springer},
abstract = {Lots of revocable group signature schemes have been proposed so far. In one type of revocable schemes, signing and/or verifying algorithms have O(N) or O(R) complexity, where N is the group size and R is the number of revoked members. On the other hand, in Camenisch-Lysyanskaya scheme and the followers, signing and verifying algorithms have O(1) complexity. However, before signing, updates of the secret key are required. The complexity is O(R) in the worst case. In this paper, we propose a revocable scheme with signing and verifying of O(1) complexity, where no updates of secret key are required. The compensation is the long public key of O(N). In addition, we extend it to the scheme with {\$}O({\backslash}sqrt{\{}N{\}}){\$} -size public key, where signing and verifying have constant extra costs.},
isbn = {978-3-642-00468-1},
}
@InProceedings{CZ09,
author = {Camenisch, Jan and Zaverucha, Gregory M.},
title = {Private Intersection of Certified Sets},
booktitle = {Financial Cryptography},
year = {2009},
pages = {108--127},
address = {Berlin, Heidelberg},
publisher = {Springer},
isbn = {978-3-642-03549-4},
}
@Misc{AG,
author = {D. F. Aranha and C. P. L. Gouv\^{e}a},
title = {{RELIC is an Efficient LIbrary for Cryptography}},
howpublished = {\url{https://github.com/relic-toolkit/relic}},
}
@InProceedings{CL04a,
author = {Camenisch, Jan and Lysyanskaya, Anna},
title = {{A Signature Scheme with Efficient Protocols}},
booktitle = {{SCN}},
year = {2004},
series = {LNCS},
pages = {268--289},
publisher = {Springer},
}
@InProceedings{Oka06,
author = {Okamoto, Tatsuaki},
title = {{Efficient Blind and Partially Blind Signatures Without Random Oracles}},
booktitle = {{TCC}},
year = {2006},
series = {LNCS},
pages = {80--99},
publisher = {Springer},
}
@InProceedings{GLOW12,
author = {Gerbush, Michael and Lewko, Allison and O'Neill, Adam and Waters, Brent},
title = {{Dual Form Signatures: An Approach for Proving Security from Static Assumptions}},
booktitle = {Asiacrypt},
year = {2012},
series = {LNCS},
pages = {25--42},
publisher = {Springer},
}
@InProceedings{Fre10,
author = {Freeman, David Mandell},
title = {{Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups}},
booktitle = {Eurocrypt},
year = {2010},
series = {LNCS},
pages = {44--61},
publisher = {Springer},
}
@Misc{YCZY14,
author = {Tsz Hon Yuen and Sherman S.M. Chow and Cong Zhang and Siu Ming Yiu},
title = {Exponent-inversion Signatures and IBE under Static Assumptions},
howpublished = {Cryptology ePrint Archive, Report 2014/311},
year = {2014},
note = {\url{https:/ia.cr/2014/311}},
}
@InProceedings{JR14,
author = {Jutla, Charanjit and Roy, Arnab},
title = {{Switching Lemma for Bilinear Tests and Constant-Size NIZK Proofs for Linear Subspaces}},
booktitle = {Crypto},
year = {2014},
volume = {8617},
series = {LNCS},
pages = {295--312},
publisher = {Springer},
}
@InProceedings{PS96,
author = {Pointcheval, David and Stern, Jacques},
title = {{Security Proofs for Signature Schemes}},
booktitle = {Eurocrypt},
year = {1996},
series = {LNCS},
pages = {387--398},
publisher = {Springer},
}
@InProceedings{GT03,
author = {Goldwasser, Shafi and Tauman, Kalai Yael},
title = {{On the (In)security of the Fiat-Shamir Paradigm}},
booktitle = {FOCS},
year = {2003},
pages = {102},
publisher = {ACM},
}
@InProceedings{Pre17,
author = {Prest, Thomas},
title = {{Sharper Bounds in Lattice-Based Cryptography Using the Rényi Divergence}},
booktitle = {Asiacrypt},
year = {2017},
series = {LNCS},
pages = {347--374o},
publisher = {Springer},
}
@InProceedings{CHK04,
author = {Canetti, Ran and Halevi, Shai and Katz, Jonathan},
title = {{Chosen-Ciphertext Security from Identity-Based Encryption}},
booktitle = {Eurocrypt},
year = {2004},
series = {LNCS},
pages = {207--222},
publisher = {Springer},
}
@InProceedings{BBDP01,
author = {Bellare, Mihir and Boldyreva, Alexandra and Desai, Anand and Pointcheval, David},
title = {{Key-Privacy in Public-Key Encryption}},
booktitle = {PKC},
year = {2001},
series = {LNCS},
pages = {566--582},
publisher = {Springer},
}
@InProceedings{Nao03,
author = {Naor, Moni},
title = {On cryptographic assumptions and challenges},
booktitle = {Crypto},
year = {2003},
editor = {Springer},
pages = {96--109},
}
@InProceedings{GM82,
author = {Goldwasser, Shafi and Micali, Silvio},
title = {Probabilistic encryption \& how to play mental poker keeping secret all partial information},
booktitle = {STOC},
year = {1982},
pages = {365--377},
publisher = {ACM},
}
@InProceedings{SOK00,
author = {Sakai, Ryuichi and Ohgishi, Kiyoshi and Kasahara, Masao},
title = {{Cryptosystems Based on Pairings}},
booktitle = {Symposium on Cryptography and Information Security},
year = {2000},
pages = {26--28},
}
@Misc{Sco02,
author = {Scott, Mike},
title = {{Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number}},
howpublished = {Cryptology ePrint Archive},
year = {2002},
note = {\url{https://ia.cr/2002/164}},
}
@InProceedings{LPJY15,
author = {Libert, Benoît and Peters, Thomas and Joye, Marc and Yung, Moti},
title = {{Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications}},
booktitle = {Asiacrypt},
year = {2015},
pages = {681--707},
}
@Article{Sho99,
author = {Shor, Peter W.},
title = {{Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer}},
journal = {SIAM review},
year = {1999},
volume = {41},
number = {2},
pages = {303--332},
publisher = {SIAM},
}
@InProceedings{VP17,
author = {Vanhoef, Mathy and Piessens, Frank},
title = {{Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2}},
booktitle = {CCS},
year = {2017},
pages = {1313--1328},
publisher = {ACM},
}
@InProceedings{CHL+15,
author = {Cheon, Jung Hee and Han, Kyoohyung and Lee, Changmin and Ryu, Hansol and Stehlé, Damien},
title = {{Cryptanalysis of the Multilinear Map over the Integers}},
booktitle = {Eurocrypt},
year = {2015},
}
@InProceedings{Sch96,
author = {Schnorr, Claus Peter},
title = {{Security of $2^t$-Root Identification and Signatures}},
booktitle = {Crypto},
year = {1996},
series = {LNCS},
pages = {143--156},
publisher = {Springer},
}
@InProceedings{TW05,
author = {M{\aa}rten Trolin and Douglas Wikstr{\"{o}}m},
title = {{Hierarchical Group Signatures}},
booktitle = {{ICALP} 2005},
year = {2005},
volume = {3580},
series = {LNCS},
pages = {446--458},
publisher = {Springer},
timestamp = {2016.05.14},
}
@InProceedings{Pail99,
author = {Pascal Paillier},
title = {{Public-Key Cryptosystems Based on Composite Degree Residuosity Classes}},
booktitle = {{EUROCRYPT} 1999},
year = {1999},
number = {1592},
series = {LNCS},
pages = {223--238},
publisher = {Springer},
timestamp = {2016.05.14},
}
@InProceedings{LYJP14,
author = {Beno{\^\i}t Libert and Moti Yung and Marc Joye and Thomas Peters},
title = {Traceable Group Encryption},
booktitle = {{PKC} 2014},
year = {2014},
volume = {8383},
series = {LNCS},
pages = {592--610},
publisher = {Springer},
doi = {10.1007/978-3-642-54631-0_34},
timestamp = {2016.05.05},
}
@InProceedings{KTY04,
author = {Aggelos Kiayias and Yiannis Tsiounis and Moti Yung},
title = {Traceable Signatures},
booktitle = {{EUROCRYPT} 2004},
year = {2004},
volume = {3027},
series = {LNCS},
pages = {571--589},
publisher = {Springer},
timestamp = {2016.05.14},
}
@InProceedings{IPV10,
author = {Malika Izabach{\`e}ne and David Pointcheval and Damien Vergnaud},
title = {Mediated Traceable Anonymous Encryption},
booktitle = {{LATINCRYPT} 2010},
year = {2010},
volume = {6212},
series = {LNCS},
pages = {40--60},
publisher = {Springer},
timestamp = {2016.05.14},
}
@InProceedings{EJ13,
author = {El Aimani, Laila and Joye, Marc},
title = {{Toward Practical Group Encryption}},
booktitle = {{ACNS} 2013},
year = {2013},
volume = {7954},
series = {LNCS},
pages = {237--252},
publisher = {Springer},
timestamp = {2016.05.14},
}
@InProceedings{NR97,
author = {Naor, M. and Reingold, O.},
title = {Number-theoretic constructions of efficient pseudo-random functions},
booktitle = {FOCS},
year = {1997},
pages = {458--467},
publisher = {IEEE Press},
timestamp = {2016.01.28},
}
@InProceedings{LPQ17,
author = {Libert, Benoît and Peters, Thomas and Qian, Chen},
title = {{Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts}},
booktitle = {PKC},
year = {2017},
volume = {10174},
series = {LNCS},
pages = {247--276},
publisher = {Springer},
}
@InProceedings{DG17,
author = {Döttling, Nico and Garg, Sanjam},
title = {{Identity-Based Encryption from the Diffie-Hellman Assumption}},
booktitle = {Crypto},
year = {2017},
volume = {10401},
series = {LNCS},
pages = {537--569},
publisher = {Springer},
}
@Misc{RSS18,
author = {Ron D. Rothblum and Adam Sealfon and Katerina Sotiraki},
title = {{Towards Non-Interactive Zero-Knowledge for NP from LWE}},
howpublished = {{iacr ePrint Report}},
year = {2018},
note = {\url{https://eprint.iacr.org/2018/240}},
}
@InProceedings{BLS01,
author = {Boneh, Dan and Lynn, B. and Shacham, H.},
title = {{Short signatures from the Weil pairing}},
booktitle = {Asiacrypt},
year = {2001},
series = {LNCS},
pages = {514--532},
publisher = {Springer},
}
@InProceedings{Hof17,
author = {Hoffheinz, Dennis},
title = {{Adaptive Partitionning}},
booktitle = {Eurocrypt},
year = {2017},
series = {LNCS},
pages = {489--518},
publisher = {Springer},
}
@InProceedings{Hof16,
author = {Hoffheinz, Denis},
title = {{Algebraic Partitioning: Fully Compact and (almost) Tightly Secure Cryptography}},
booktitle = {TCC},
year = {2016},
series = {LNCS},
pages = {251--281},
publisher = {Springer},
}
@InProceedings{KMP16,
author = {Kiltz, Eike and Masny, Daniel and Pan, Jiaxin},
title = {{Optimal Security Proofs for Signatures from Identification Schemes}},
booktitle = {CRYPTO},
year = {2016},
series = {LNCS},
pages = {33--61},
publisher = {Springer},
abstract = {We perform a concrete security treatment of digital signature schemes obtained from canonical identification schemes via the Fiat-Shamir transform. If the identification scheme is random self-reducible and satisfies the weakest possible security notion (hardness of key-recoverability), then the signature scheme obtained via Fiat-Shamir is unforgeable against chosen-message attacks in the multi-user setting. Our security reduction is in the random oracle model and loses a factor of roughly {\$}{\$}Q{\_}h{\$}{\$} , the number of hash queries. Previous reductions incorporated an additional multiplicative loss of N, the number of users in the system. Our analysis is done in small steps via intermediate security notions, and all our implications have relatively simple proofs. Furthermore, for each step, we show the optimality of the given reduction in terms of model assumptions and tightness.},
isbn = {978-3-662-53008-5},
}
@InProceedings{DSYC18,
author = {Deng, Yi and Song, Xuyang and Yu, Jingyue and Chen, Yu},
title = {{On the Security of Classic Protocols for Unique Witness Relations}},
booktitle = {PKC},
year = {2018},
series = {LNCS},
publisher = {Springer},
}
@InProceedings{GHKW16,
author = {Gay, Romain and Hofheinz, Dennis and Kiltz, Eike and Wee, Hoeteck},
title = {Tightly CCA-Secure Encryption Without Pairings},
booktitle = {Advances in Cryptology -- EUROCRYPT 2016},
year = {2016},
series = {LNCS},
pages = {1--27},
publisher = {Springer Berlin Heidelberg},
isbn = {978-3-662-49890-3},
}
@InProceedings{AHN+17,
author = {Abe, Masayuki and Hofheinz, Dennis and Nishimaki, Ryo and Ohkubo, Miyako and Pan, Jiaxin},
title = {Compact structure-preserving signatures with almost tight security},
booktitle = {Crypto},
year = {2017},
series = {LNCS},
pages = {548--580},
publisher = {Springer},
}
@InProceedings{BG92,
author = {Bellare, Mihir and Goldreich, Oded},
title = {{On Defining Proofs of Knowledge}},
booktitle = {Crypto},
year = {1992},
volume = {740},
series = {LNCS},
pages = {390--420},
publisher = {Springer},
}
@InProceedings{KW18,
author = {Sam Kim and David J. Wu},
title = {{Multi-Theorem Preprocessing NIZKs from Lattices}},
booktitle = {Crypto},
year = {2018},
series = {LNCS},
pages = {To appear},
publisher = {Springen},
}
@InProceedings{LSSS17,
author = {Libert, Benoît and Sakzad, Amin and Stehlé, Damien and Steinfeld, Ron},
title = {{All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE}},
booktitle = {Crypto},
year = {2017},
series = {LNCS},
pages = {332--364},
publisher = {Springer},
}
@InProceedings{LJYP14,
author = {Libert, Benoît and Joye, Marc and Yung, Moti and Peters, Thomas},
title = {{Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security}},
booktitle = {Asiacrypt},
year = {2014},
series = {LNCS},
pages = {1--21},
publisher = {Springer},
}
@InProceedings{PS18,
author = {Pointcheval, David and Sanders, Olivier},
title = {{Reassessing Security of Randomizable Signatures}},
booktitle = {CT-RSA},
year = {2018},
series = {LNCS},
pages = {319--338},
publisher = {Springer},
}
@InProceedings{BLSV18,
author = {Brakerski, Zvika and Lombardi, Alex and Segev, Gil and Vaikuntanathan, Vinod},
title = {{Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions}},
booktitle = {{Eurocrypt}},
year = {2018},
series = {LNCS},
pages = {535--564},
publisher = {Springer},
abstract = {In anonymous identity-based encryption (IBE), ciphertexts not only hide their corresponding messages, but also their target identity. We construct an anonymous IBE scheme based on the Computational Diffie-Hellman (CDH) assumption in general groups (and thus, as a special case, based on the hardness of factoring Blum integers).},
isbn = {978-3-319-78381-9},
}
@InProceedings{PW08,
author = {Peikert, Chris and Waters, Brent},
title = {{Lossy Trapdoor Functions and Their Applications}},
booktitle = {STOC},
year = {2008},
pages = {187--196},
publisher = {ACM},
}
@InProceedings{LNWX18,
author = {Ling, San and Nguyen, Khoa and Wang, Huaxiong and Xu, Yanhong},
title = {{Constant-Size Group Signatures from Lattices}},
booktitle = {PKC},
year = {2018},
series = {LNCS},
pages = {58--88},
publisher = {Springer},
abstract = {Lattice-based group signature is an active research topic in recent years. Since the pioneering work by Gordon, Katz and Vaikuntanathan (Asiacrypt 2010), ten other schemes have been proposed, providing various improvements in terms of security, efficiency and functionality. However, in all known constructions, one has to fix the number N of group users in the setup stage, and as a consequence, the signature sizes are dependent on N.},
isbn = {978-3-319-76581-5},
}
@InProceedings{DM14,
author = {Ducas, L{\'e}o and Micciancio, Daniele},
title = {{Improved Short Lattice Signatures in the Standard Model}},
booktitle = {Crypto},
year = {2014},
series = {LNCS},
pages = {335--352},
publisher = {Springer},
abstract = {We present a signature scheme provably secure in the standard model (no random oracles) based on the worst-case complexity of approximating the Shortest Vector Problem in ideal lattices within polynomial factors. The distinguishing feature of our scheme is that it achieves short signatures (consisting of a single lattice vector), and relatively short public keys (consisting of O(logn) vectors.) Previous lattice schemes in the standard model with similarly short signatures, due to Boyen (PKC 2010) and Micciancio and Peikert (Eurocrypt 2012), had substantially longer public keys consisting of $\Omega$(n) vectors (even when implemented with ideal lattices).},
isbn = {978-3-662-44371-2},
}
@InProceedings{Moh11,
author = {Mohassel, Payman},
title = {{One-Time Signatures and Chameleon Hash Functions}},
booktitle = {SAC},
year = {2011},
series = {LCNS},
pages = {302--319},
publisher = {Springer},
abstract = {In this work we show a general construction for transforming any chameleon hash function to a strongly unforgeable one-time signature scheme. Combined with the result of [Bellare and Ristov, PKC 2007], this also implies a general construction of strongly unforgeable one-time signatures from $\Sigma$-protocols in the standard model.},
isbn = {978-3-642-19574-7},
}
@InProceedings{LM08,
author = {Lyubashevsky, Vadim and Micciancio, Daniele},
title = {{Asymptotically Efficient Lattice-Based Digital Signatures}},
booktitle = {TCC},
year = {2008},
series = {LNCS},
pages = {37--54},
publisher = {Springer},
abstract = {We give a direct construction of digital signatures based on the complexity of approximating the shortest vector in ideal (e.g., cyclic) lattices. The construction is provably secure based on the worst-case hardness of approximating the shortest vector in such lattices within a polynomial factor, and it is also asymptotically efficient: the time complexity of the signing and verification algorithms, as well as key and signature size is almost linear (up to poly-logarithmic factors) in the dimension n of the underlying lattice. Since no sub-exponential (in n) time algorithm is known to solve lattice problems in the worst case, even when restricted to cyclic lattices, our construction gives a digital signature scheme with an essentially optimal performance/security trade-off.},
isbn = {978-3-540-78524-8},
}
@Article{LS14,
author = {Langlois, Adeline and Stehlé, Damien},
title = {{Worst-case to average-case reductions for module lattices}},
journal = {Designs, Codes and Cryptography},
year = {2014},
}
@InProceedings{DG17a,
author = {D{\"o}ttling, Nico and Garg, Sanjam},
title = {{From Selective IBE to Full IBE and Selective HIBE}},
booktitle = {TCC},
year = {2017},
series = {LNCS},
pages = {372--408},
publisher = {Springer},
abstract = {Starting with any selectively secure identity-based encryption (IBE) scheme, we give generic constructions of fully secure IBE and selectively secure hierarchical IBE (HIBE) schemes. Our HIBE scheme allows for delegation arbitrarily many times.},
isbn = {978-3-319-70500-2},
}
@InProceedings{IKOS07,
author = {Ishai, Yuval and Kushilevitz, Eyal and Ostrovsky, Rafail and Sahai, Amit},
title = {{Zero-knowledge from Secure Multiparty Computation}},
booktitle = {STOC},
year = {2007},
pages = {21--30},
publisher = {ACM},
acmid = {1250794},
doi = {10.1145/1250790.1250794},
isbn = {978-1-59593-631-8},
keywords = {black-box reductions, cryptography, secure computation, zero-knowledge},
location = {San Diego, California, USA},
numpages = {10},
url = {http://doi.acm.org/10.1145/1250790.1250794},
}
@InProceedings{JDF11,
author = {Jao, David and De Feo, Luca},
title = {{Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies}},
booktitle = {PQCrypto},
year = {2011},
series = {LNCS},
pages = {19--34},
publisher = {Springer},
abstract = {We present new candidates for quantum-resistant public-key cryptosystems based on the conjectured difficulty of finding isogenies between supersingular elliptic curves. The main technical idea in our scheme is that we transmit the images of torsion bases under the isogeny in order to allow the two parties to arrive at a common shared key despite the noncommutativity of the endomorphism ring. Our work is motivated by the recent development of a subexponential-time quantum algorithm for constructing isogenies between ordinary elliptic curves. In the supersingular case, by contrast, the fastest known quantum attack remains exponential, since the noncommutativity of the endomorphism ring means that the approach used in the ordinary case does not apply. We give a precise formulation of the necessary computational assumption along with a discussion of its validity. In addition, we present implementation results showing that our protocols are multiple orders of magnitude faster than previous isogeny-based cryptosystems over ordinary curves.},
isbn = {978-3-642-25405-5},
}
@InProceedings{GPS17,
author = {Galbraith, Steven D. and Petit, Christophe and Silva, Javier},
title = {{Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems}},
booktitle = {Asiacrypt},
year = {2017},
series = {LNCS},
pages = {3--33},
publisher = {Springer},
abstract = {We provide a new identification protocol and new signature schemes based on isogeny problems. Our identification protocol relies on the hardness of the endomorphism ring computation problem, arguably the hardest of all problems in this area, whereas the only previous scheme based on isogenies (due to De Feo, Jao and Pl{\^u}t) relied on potentially easier problems. The protocol makes novel use of an algorithm of Kohel-Lauter-Petit-Tignol for the quaternion version of the {\$}{\$}{\backslash}ell {\$}{\$} -isogeny problem, for which we provide a more complete description and analysis. Our new signature schemes are derived from the identification protocols using the Fiat-Shamir (respectively, Unruh) transforms for classical (respectively, post-quantum) security. We study their efficiency, highlighting very small key sizes and reasonably efficient signing and verification algorithms.},
isbn = {978-3-319-70694-8},
}
@Comment{jabref-meta: databaseType:bibtex;}