2547 lines
74 KiB
BibTeX
2547 lines
74 KiB
BibTeX
% Encoding: windows-1252
|
||
|
||
@InCollection{BCKL08,
|
||
author = {Belenkiy, Mira and Chase, Melissa and Kohlweiss, Markulf and Lysyanskaya, Anna},
|
||
title = {{P}-signatures and Noninteractive Anonymous Credentials},
|
||
booktitle = {{TCC}},
|
||
publisher = {Springer},
|
||
year = {2008},
|
||
number = {4948},
|
||
series = {LNCS},
|
||
}
|
||
|
||
@InCollection{CL04,
|
||
author = {Camenisch, Jan and Lysyanskaya, Anna},
|
||
title = {Signature Schemes and Anonymous Credentials from Bilinear Maps},
|
||
booktitle = {{Crypto}},
|
||
publisher = {Springer},
|
||
year = {2004},
|
||
number = {3152},
|
||
series = {LNCS},
|
||
pages = {56--72},
|
||
}
|
||
|
||
@InCollection{CL02,
|
||
author = {Camenisch, Jan and Lysyanskaya, Anna},
|
||
title = {A Signature Scheme with Efficient Protocols},
|
||
booktitle = {{SCN}},
|
||
publisher = {Springer},
|
||
year = {2002},
|
||
number = {2576},
|
||
series = {LNCS},
|
||
pages = {268--289},
|
||
}
|
||
|
||
@InCollection{CS97,
|
||
author = {Camenisch, Jan and Stadler, Markus},
|
||
title = {Efficient group signature schemes for large groups},
|
||
booktitle = {{Crypto}},
|
||
publisher = {Springer},
|
||
year = {1997},
|
||
}
|
||
|
||
@InProceedings{CS99,
|
||
author = {Cramer, R. and Shoup, V.},
|
||
title = {Signature Schemes Based On the Strong RSA Assumption},
|
||
booktitle = {{ACM-CCS}},
|
||
year = {1999},
|
||
publisher = {ACM},
|
||
}
|
||
|
||
@InProceedings{FO97,
|
||
author = {Fujisaki, E. and Okamoto, T.},
|
||
title = {Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations},
|
||
booktitle = {{Crypto}},
|
||
year = {1997},
|
||
volume = {1294},
|
||
series = {LNCS},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@Misc{Inu12,
|
||
author = {Inutile, Club},
|
||
title = {The Password Security Checker},
|
||
howpublished = {Website, available at {\url{http://inutile.club/estatis/password-security-checker/}}},
|
||
year = {2012},
|
||
}
|
||
|
||
@InCollection{LNW15,
|
||
author = {Ling, San and Nguyen, Khoa and Wang, Huaxiong},
|
||
title = {{Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based}},
|
||
booktitle = {{PKC}},
|
||
publisher = {Springer},
|
||
year = {2015},
|
||
volume = {9020},
|
||
series = {LNCS},
|
||
pages = {427--449},
|
||
url = {http://dx.doi.org/10.1007/978-3-662-46447-2_19},
|
||
}
|
||
|
||
@InProceedings{Lyu12,
|
||
author = {Lyubashevsky, V.},
|
||
title = {Lattice Signatures Without Trapdoors},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2012},
|
||
volume = {7237},
|
||
series = {LNCS},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{PSTY13,
|
||
author = {Charalampos Papamanthou and Elaine Shi and Roberto Tamassia and Ke Yi},
|
||
title = {Streaming Authenticated Data Structures},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2013},
|
||
volume = {7881},
|
||
series = {LNCS},
|
||
pages = {353--370},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@Misc{Pei15,
|
||
author = {Peikert, Chris},
|
||
title = {A Decade of Lattice Cryptography},
|
||
howpublished = {Cryptology ePrint Archive: Report 2015/939},
|
||
year = {2015},
|
||
}
|
||
|
||
@InCollection{SSE+12,
|
||
author = {Sakai, Y. and Schuldt, J. and Emura, K. and Hanaoka, G. and Ohta, K.},
|
||
title = {On the Security of Dynamic Group Signatures: Preventing Signature Hijacking},
|
||
booktitle = {{PKC}},
|
||
publisher = {Springer},
|
||
year = {2012},
|
||
volume = {7293},
|
||
series = {LNCS},
|
||
pages = {715--732},
|
||
}
|
||
|
||
@InProceedings{ACDN13,
|
||
author = {Abe, Masayuki and Camenisch, Jan and Dubovitskaya, Maria and Nishimaki, Ryo},
|
||
title = {Universally composable adaptive oblivious transfer (with access control) from standard assumptions},
|
||
booktitle = {ACM Workshop on Digital Identity Management},
|
||
year = {2013},
|
||
pages = {1--12},
|
||
doi = {10.1145/2517881.2517883},
|
||
}
|
||
|
||
@InProceedings{AIR01,
|
||
author = {William Aiello and Yuval Ishai and Omer Reingold},
|
||
title = {Priced oblivious transfer: How to sell digital goods},
|
||
booktitle = {Eurocrypt},
|
||
year = {2001},
|
||
pages = {119--135},
|
||
}
|
||
|
||
@InProceedings{AKPW13,
|
||
author = {Alwen, Jo\"el and Krenn, Stephan and Pietrzak, Krzysztof and Wichs, Daniel},
|
||
title = {Learning with Rounding Revisited -- New Reduction, Properties and Applications},
|
||
booktitle = {{Crypto}},
|
||
year = {2013},
|
||
volume = {8042},
|
||
series = {LNCS},
|
||
pages = {57--74},
|
||
organization = {Springer},
|
||
}
|
||
|
||
@InProceedings{AWSM07,
|
||
author = {Man Ho Au and Qianhong Wu and Willy Susilo and Yi Mu},
|
||
title = {Compact E-Cash from Bounded Accumulator},
|
||
booktitle = {{CT-RSA}'07},
|
||
year = {2007},
|
||
number = {4377},
|
||
series = {LNCS},
|
||
pages = {178--195},
|
||
}
|
||
|
||
@Misc{Ban15,
|
||
author = {Banerjee, A.},
|
||
title = {New Constructions of Cryptographic Pseudo-Random Functions},
|
||
howpublished = {PhD thesis, Georgia Institute of Technology},
|
||
year = {2015},
|
||
}
|
||
|
||
@InProceedings{BBL+14,
|
||
author = {Banerjee, A. and Brenner, H. and Leurent, G. and Peikert, C. and Rosen, A.},
|
||
title = {SPRING: Fast Pseudorandom Functions from Rounded Ring Products},
|
||
booktitle = {{FSE}},
|
||
year = {2014},
|
||
volume = {8540},
|
||
series = {LNCS},
|
||
pages = {38--57},
|
||
}
|
||
|
||
@InProceedings{BP14,
|
||
author = {Banerjee, Abhishek and Peikert, Chris},
|
||
title = {New and Improved Key-Homomorphic Pseudo-Random Functions},
|
||
booktitle = {{Crypto}},
|
||
year = {2014},
|
||
volume = {8616},
|
||
series = {LNCS},
|
||
pages = {353--370},
|
||
organization = {Springer},
|
||
}
|
||
|
||
@InProceedings{BPR12,
|
||
author = {Banerjee, Abhishek and Peikert, Chris and Rosen, Alon},
|
||
title = {Pseudo-Random Functions and Lattices},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2012},
|
||
volume = {7237},
|
||
series = {LNCS},
|
||
pages = {719--737},
|
||
organization = {Springer},
|
||
}
|
||
|
||
@InProceedings{BBSU12,
|
||
author = {Barber, S. and Boyen, X. and Shi, E. and Uzun, E.},
|
||
title = {Bitter to Better : How to Make Bitcoin a Better Currency},
|
||
booktitle = {{Financial Cryptography}},
|
||
year = {2012},
|
||
volume = {7397},
|
||
series = {LNCS},
|
||
pages = {399--414},
|
||
}
|
||
|
||
@InProceedings{Bar86,
|
||
author = {Barrington, D.},
|
||
title = {Bounded-Width Polynomial-Size Branching Programs Recognize Exactly Those Languages in NC1},
|
||
booktitle = {{STOC}'86},
|
||
year = {1986},
|
||
pages = {1--5},
|
||
}
|
||
|
||
@InProceedings{BCKL08a,
|
||
author = {Belenkiy, Mira and Chase, Melissa and Kohlweiss, Markulf and Lysyanskaya, Anna},
|
||
title = {P-signatures and Noninteractive Anonymous Credentials},
|
||
booktitle = {{TCC'08}},
|
||
year = {2008},
|
||
number = {4948},
|
||
series = {LNCS},
|
||
pages = {356--374},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{BCKL09,
|
||
author = {Belenkiy, Mira and Chase, Melissa and Kohlweiss, Markulf and Lysyanskaya, Anna},
|
||
title = {Compact E-Cash and Simulatable VRFs Revisited},
|
||
booktitle = {{Pairing}},
|
||
year = {2009},
|
||
volume = {5671},
|
||
series = {LNCS},
|
||
pages = {114--131},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{BCG+14,
|
||
author = {Eli Ben-Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and Ian Miers and Eran Tromer and Madars Virza},
|
||
title = {Zerocash: Decentralized Anonymous Payments from Bitcoin},
|
||
booktitle = {{IEEE Symposium on Security and Privacy}},
|
||
year = {2014},
|
||
pages = {459--474},
|
||
}
|
||
|
||
@InProceedings{BGM+16,
|
||
author = {Bogdanov, Andrej and Guo, Siyao and Masny, Daniel and Richelson, Silas and Rosen, Alon},
|
||
title = {On the Hardness of Learning With Rounding over Small Modulus},
|
||
booktitle = {{TCC}},
|
||
year = {2016},
|
||
volume = {9562},
|
||
series = {LNCS},
|
||
pages = {209--224},
|
||
}
|
||
|
||
@InProceedings{BGG+14,
|
||
author = {Boneh, D. and Gentry, C. and Gorbunov, S. and Halevi, S. and Nikolaenko, V. and Segev, G. and Vaikuntanathan, V. and Vinayagamurthy, D.},
|
||
title = {Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2014},
|
||
}
|
||
|
||
@InProceedings{BLMR13,
|
||
author = {Boneh, Dan and Lewi, Kevin and Montgomery, Hart and Raghunathan, Ananth},
|
||
title = {Key-Homomorphic PRFs and their Applications},
|
||
booktitle = {{Crypto}},
|
||
year = {2013},
|
||
volume = {8042},
|
||
series = {LNCS},
|
||
pages = {410--428},
|
||
organization = {Springer},
|
||
}
|
||
|
||
@InProceedings{BDPMW16,
|
||
author = {Bourse, F. and Del Pino, R. and Minelli, M. and Wee, H},
|
||
title = {{FHE} Circuit Privacy Almost for Free},
|
||
booktitle = {{Crypto}},
|
||
year = {2016},
|
||
number = {9815},
|
||
series = {LNCS},
|
||
pages = {62--89},
|
||
}
|
||
|
||
@InProceedings{BV11,
|
||
author = {Brakerski, Z. and Vaikuntanathan, V.},
|
||
title = {Efficient Fully Homomorphic Encryption from (Standard) {LWE}},
|
||
booktitle = {{FOCS}},
|
||
year = {2011},
|
||
pages = {97--106},
|
||
}
|
||
|
||
@TechReport{Bra93,
|
||
author = {Brands, S.},
|
||
title = {An efficient off-line electronic cash system based on the representation problem},
|
||
institution = {Technical Report CS-R9323, CWI},
|
||
year = {1993},
|
||
}
|
||
|
||
@InProceedings{BCR87,
|
||
author = {Brassard, Gilles and Cr{\'e}peau, Claude and Robert, Jean-Marc},
|
||
title = {All-or-nothing disclosure of secrets.},
|
||
booktitle = {{Crypto}},
|
||
year = {1987},
|
||
volume = {263},
|
||
series = {LNCS},
|
||
pages = {234--238},
|
||
}
|
||
|
||
@InProceedings{CCs08,
|
||
author = {Camenisch, J. and Chaabouni, R. and shelat, a.},
|
||
title = {Efficient Protocols for Set Membership and Range Proofs},
|
||
booktitle = {{Asiacrypt}},
|
||
year = {2008},
|
||
volume = {5350},
|
||
series = {LNCS},
|
||
pages = {234--252},
|
||
}
|
||
|
||
@InProceedings{CD00,
|
||
author = {Camenisch, J. and Damg{\aa}rd, I.},
|
||
title = {Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes},
|
||
booktitle = {{Asiacrypt}},
|
||
year = {2000},
|
||
volume = {1976},
|
||
series = {LNCS},
|
||
pages = {331--345},
|
||
}
|
||
|
||
@InProceedings{CDEN12,
|
||
author = {Camenisch, J. and Dubovitskaya, M. and Enderlein, R. and Neven, G.},
|
||
title = {Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption},
|
||
booktitle = {{SCN}},
|
||
year = {2012},
|
||
volume = {7485},
|
||
series = {LNCS},
|
||
pages = {559--579},
|
||
}
|
||
|
||
@InProceedings{CDN09,
|
||
author = {Camenisch, J. and Dubovitskaya, M. and Neven, G.},
|
||
title = {Oblivious transfer with access control},
|
||
booktitle = {{ACM-CCS}},
|
||
year = {2009},
|
||
pages = {131--140},
|
||
}
|
||
|
||
@InProceedings{CDNZ11,
|
||
author = {Camenisch, J. and Dubovitskaya, M. and Neven, G. and Zaverucha, G.},
|
||
title = {Oblivious Transfer with Hidden Access Control Policies},
|
||
booktitle = {{PKC}'11},
|
||
year = {2011},
|
||
volume = {6571},
|
||
series = {LNCS},
|
||
pages = {192--209},
|
||
}
|
||
|
||
@InProceedings{CHL05,
|
||
author = {Camenisch, Jan and Hohenberger, Susan and Lysyanskaya, Anna},
|
||
title = {Balancing Accountability and Privacy Using E-Cash},
|
||
booktitle = {{SCN}},
|
||
year = {2005},
|
||
number = {4116},
|
||
series = {LNCS},
|
||
pages = {141--155},
|
||
}
|
||
|
||
@InProceedings{CL02a,
|
||
author = {Camenisch, Jan and Lysyanskaya, Anna},
|
||
title = {A Signature Scheme with Efficient Protocols},
|
||
booktitle = {{Security and Cryptography for Networks} (SCN'02)},
|
||
year = {2002},
|
||
number = {2576},
|
||
series = {LNCS},
|
||
pages = {268--289},
|
||
}
|
||
|
||
@InProceedings{CL04a,
|
||
author = {Camenisch, Jan and Lysyanskaya, Anna},
|
||
title = {Signature Schemes and Anonymous Credentials from Bilinear Maps},
|
||
booktitle = {{Crypto}},
|
||
year = {2004},
|
||
number = {3152},
|
||
series = {LNCS},
|
||
pages = {56--72},
|
||
}
|
||
|
||
@InProceedings{CLM07,
|
||
author = {Camenisch, Jan and Lysyanskaya, Anna and Meyerovich, M.},
|
||
title = {Endorsed E-Cash},
|
||
booktitle = {{IEEE Security \& Privacy }},
|
||
year = {2007},
|
||
pages = {101--115},
|
||
}
|
||
|
||
@InProceedings{CNs07,
|
||
author = {Camenisch, J. and Neven, G. and shelat, a.},
|
||
title = {Simulatable Adaptive Oblivious Transfer},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2007},
|
||
volume = {4515},
|
||
series = {LNCS},
|
||
pages = {573--590},
|
||
}
|
||
|
||
@InProceedings{CS97a,
|
||
author = {Camenisch, Jan and Stadler, Markus},
|
||
title = {Efficient group signature schemes for large groups},
|
||
booktitle = {Crypto'97},
|
||
year = {1997},
|
||
pages = {410--424},
|
||
}
|
||
|
||
@InProceedings{CG07,
|
||
author = {Canard, S. and Gouget, A.},
|
||
title = {Divisible E-Cash Systems Can Be Truly Anonymous},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2007},
|
||
volume = {4515},
|
||
series = {LNCS},
|
||
pages = {482--497},
|
||
}
|
||
|
||
@InProceedings{CG08a,
|
||
author = {Canard, S. and Gouget, A.},
|
||
title = {Anonymity in Transferable E-cash},
|
||
booktitle = {{ACNS}},
|
||
year = {2008},
|
||
volume = {5037},
|
||
series = {LNCS},
|
||
pages = {207--223},
|
||
}
|
||
|
||
@InProceedings{CG10,
|
||
author = {Canard, S. and Gouget, A.},
|
||
title = {Multiple Denominations in E-cash with Compact Transaction Data},
|
||
booktitle = {{Financial Cryptography}},
|
||
year = {2010},
|
||
volume = {6052},
|
||
series = {LNCS},
|
||
pages = {82--97},
|
||
}
|
||
|
||
@InProceedings{CGT08,
|
||
author = {Canard, S. and Gouget, A. and Traor\'e, J.},
|
||
title = {Improvement of Efficiency in (Unconditional) Anonymous Transferable E-Cash},
|
||
booktitle = {{Financial Cryptography}},
|
||
year = {2008},
|
||
volume = {5143},
|
||
series = {LNCS},
|
||
pages = {202--214},
|
||
}
|
||
|
||
@InProceedings{CPST15,
|
||
author = {Canard, S. and Pointcheval, D. and Sanders, O. and Traor\'e, J.},
|
||
title = {Divisible E-Cash Made Practical},
|
||
booktitle = {{PKC}},
|
||
year = {2015},
|
||
volume = {9020},
|
||
series = {LNCS},
|
||
pages = {77--100},
|
||
}
|
||
|
||
@InProceedings{CPST15a,
|
||
author = {Canard, S. and Pointcheval, D. and Sanders, O. and Traor\'e, J.},
|
||
title = {Scalable Divisible E-cash},
|
||
booktitle = {{ACNS}},
|
||
year = {2015},
|
||
volume = {9092},
|
||
series = {LNCS},
|
||
pages = {287--306},
|
||
}
|
||
|
||
@Article{Can00,
|
||
author = {Canetti, Ran},
|
||
title = {Security and composition of multi-party cryptographic protocols},
|
||
year = {2000},
|
||
volume = {13},
|
||
number = {1},
|
||
pages = {143--202},
|
||
journaltitle = {Journal of Cryptology},
|
||
}
|
||
|
||
@InProceedings{Can01,
|
||
author = {Canetti, R.},
|
||
title = {Universally Composable Security: A New Paradigm for Cryptographic Protocols},
|
||
booktitle = {{FOCS}},
|
||
year = {2001},
|
||
pages = {136--145},
|
||
}
|
||
|
||
@InProceedings{CFT98,
|
||
author = {Chan, A. and Frankel, Y. and Tsiounis, Y.},
|
||
title = {Easy come, easy go divisible cash},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {1998},
|
||
volume = {1403},
|
||
series = {LNCS},
|
||
pages = {561--575},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{Cha82,
|
||
author = {Chaum, D.},
|
||
title = {Blind Signatures for Untraceable Payments},
|
||
booktitle = {{Crypto}},
|
||
year = {1982},
|
||
series = {LNCS},
|
||
pages = {199--203},
|
||
}
|
||
|
||
@InProceedings{Cha83,
|
||
author = {Chaum, D.},
|
||
title = {Blind Signature System},
|
||
booktitle = {{Crypto}},
|
||
year = {1983},
|
||
series = {LNCS},
|
||
pages = {153},
|
||
}
|
||
|
||
@InProceedings{Cha89,
|
||
author = {Chaum, D.},
|
||
title = {On-line Cash Checks},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {1989},
|
||
volume = {434},
|
||
series = {LNCS},
|
||
pages = {2893293},
|
||
}
|
||
|
||
@InProceedings{CFN88,
|
||
author = {Chaum, D. and Fiat, A. and Naor, M.},
|
||
title = {Untraceable electronic cash},
|
||
booktitle = {{Crypto}},
|
||
year = {1988},
|
||
volume = {403},
|
||
series = {LNCS},
|
||
pages = {319--327},
|
||
}
|
||
|
||
@InProceedings{CP92,
|
||
author = {Chaum, D. and Pedersen, T.},
|
||
title = {Transferred Cash Grows in Size},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {1992},
|
||
volume = {658},
|
||
series = {LNCS},
|
||
pages = {390--407},
|
||
}
|
||
|
||
@InProceedings{CGKS95,
|
||
author = {Chor, B. and Goldreich, O. and Kushilevitz, E. and Sudan, M.},
|
||
title = {Private Information Retrieval},
|
||
booktitle = {{FOCS}},
|
||
year = {1995},
|
||
pages = {41--50},
|
||
}
|
||
|
||
@InProceedings{Chu05,
|
||
author = {Chu, C.-K. ad Tzeng, W.-G.},
|
||
title = {Efficient k-out-of-n Oblivious Transfer Schemes With Adaptive and Non-Adaptive Queries},
|
||
booktitle = {{PKC}},
|
||
year = {2005},
|
||
number = {3386},
|
||
series = {LNCS},
|
||
pages = {172--183},
|
||
}
|
||
|
||
@InProceedings{CGH09,
|
||
author = {Coull, S. and Green, M. and Hohenberger, S.},
|
||
title = {Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials},
|
||
booktitle = {{PKC}},
|
||
year = {2009},
|
||
number = {5443},
|
||
series = {LNCS},
|
||
}
|
||
|
||
@InProceedings{CD09,
|
||
author = {Cramer, Ronald and Damg{\aa}rd, Ivan},
|
||
title = {On the Amortized Complexity of Zero-Knowledge Protocols},
|
||
booktitle = {{Crypto}},
|
||
year = {2009},
|
||
volume = {5677},
|
||
series = {LNCS},
|
||
pages = {177--191},
|
||
__markedentry = {[fmouhart:]},
|
||
}
|
||
|
||
@InProceedings{CK88,
|
||
author = {Cr{\'e}peau, Claude and Kilian, Joe},
|
||
title = {Weakening security assumptions and Oblivious Transfer},
|
||
booktitle = {Crypto},
|
||
year = {1988},
|
||
pages = {2--7},
|
||
}
|
||
|
||
@InProceedings{DDC94,
|
||
author = {D'Amiano, S. and Di Crescenzo, G.},
|
||
title = {Methodology for Digital Money based on General Cryptographic Tools},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {1994},
|
||
volume = {950},
|
||
series = {LNCS},
|
||
pages = {156--170},
|
||
}
|
||
|
||
@InProceedings{DN03,
|
||
author = {Damg{\aa}rd, I. and Nielsen, J.-B.},
|
||
title = {Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption},
|
||
booktitle = {{Crypto}},
|
||
year = {2003},
|
||
number = {2729},
|
||
series = {LNCS},
|
||
pages = {247--264},
|
||
}
|
||
|
||
@InProceedings{DCOR99,
|
||
author = {Di Crescenzo, G. and Ostrovsky, R. and Rajagopalan, S.},
|
||
title = {Conditional oblivious transfer and timed-release encryption},
|
||
booktitle = {{Eurocrypt}'99},
|
||
year = {1999},
|
||
number = {1592},
|
||
series = {LNCS},
|
||
pages = {74--89},
|
||
}
|
||
|
||
@InProceedings{Dod03,
|
||
author = {Dodis, Y.},
|
||
title = {Efficient Construction of (Distributed) Verifiable Random Functions},
|
||
booktitle = {{PKC}},
|
||
year = {2003},
|
||
volume = {2567},
|
||
series = {LNCS},
|
||
pages = {1--17},
|
||
}
|
||
|
||
@InProceedings{DY05,
|
||
author = {Dodis, Y. and Yampolskiy, A.},
|
||
title = {A Verifiable Random Function with Short Proofs and Keys},
|
||
booktitle = {{PKC}},
|
||
year = {2005},
|
||
number = {3386},
|
||
series = {LNCS},
|
||
pages = {416--431},
|
||
}
|
||
|
||
@InProceedings{DFKS16,
|
||
author = {D\"ottling, N. and Fleischhacker, N. and Krupp, J. and Schr\"oder, D.},
|
||
title = {Two-Message, Oblivious Evaluation of Cryptographic Functionalities},
|
||
booktitle = {{Crypto}},
|
||
year = {2016},
|
||
number = {9816},
|
||
series = {LNCS},
|
||
pages = {619--648},
|
||
}
|
||
|
||
@InProceedings{DS15,
|
||
author = {D\"ottling, N. and Schr\"oder, D.},
|
||
title = {Efficient Pseudorandom Functions via On-the-Fly Adaptation},
|
||
booktitle = {{Crypto}},
|
||
year = {2015},
|
||
volume = {9215},
|
||
series = {LNCS},
|
||
pages = {329--350},
|
||
}
|
||
|
||
@InProceedings{DS16,
|
||
author = {Ducas, L. and Stehl\'e, D.},
|
||
title = {Sanitization of {FHE} Ciphertexts},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2016},
|
||
series = {LNCS},
|
||
note = {Cryptology ePrint Archive: Report 2016/164},
|
||
}
|
||
|
||
@Article{EGL85,
|
||
author = {Even, S. and Goldreich, O. and Lempel, A.},
|
||
title = {A Randomized Protocol for Signing Contracts},
|
||
year = {1985},
|
||
volume = {28},
|
||
number = {6},
|
||
pages = {637--647},
|
||
journaltitle = {Communications of the {ACM}},
|
||
}
|
||
|
||
@InProceedings{FTY96,
|
||
author = {Frankel, Y. and Tsiounis, Y. and Yung, M.},
|
||
title = {"Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash},
|
||
booktitle = {{Asiacrypt}},
|
||
year = {1996},
|
||
volume = {1163},
|
||
series = {LNCS},
|
||
pages = {286--300},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{FY93,
|
||
author = {Franklin, M. and Yung, M.},
|
||
title = {Secure and Efficient Off-Line Digital Money},
|
||
booktitle = {{ICALP}},
|
||
year = {1993},
|
||
volume = {700},
|
||
series = {LNCS},
|
||
pages = {265--276},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{FIPR05,
|
||
author = {Freedman, M. and Ishai, Y. and Pinkas, B. and Reingold, O.},
|
||
title = {Keyword Search and Oblivious Pseudorandom Functions},
|
||
booktitle = {{TCC}},
|
||
year = {2005},
|
||
volume = {3378},
|
||
series = {LNCS},
|
||
pages = {303--324},
|
||
}
|
||
|
||
@InProceedings{FPV09,
|
||
author = {Fuchsbauer, G. and Pointcheval, D. and Vergnaud, D.},
|
||
title = {Transferable Constant-Size Fair E-Cash},
|
||
booktitle = {{CANS}},
|
||
year = {2009},
|
||
volume = {5888},
|
||
series = {LNCS},
|
||
pages = {226--247},
|
||
}
|
||
|
||
@InProceedings{GSW13,
|
||
author = {Gentry, C. and Sahai, A. and Waters, B.},
|
||
title = {Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based},
|
||
booktitle = {{Crypto}},
|
||
year = {2013},
|
||
number = {8042},
|
||
series = {LNCS},
|
||
pages = {75--92},
|
||
}
|
||
|
||
@InProceedings{GGM86,
|
||
author = {Goldreich, O. and Goldwasser, S. and Micali, S.},
|
||
title = {How to construct random functions},
|
||
booktitle = {J. of {ACM}},
|
||
year = {1986},
|
||
volume = {33},
|
||
number = {4},
|
||
pages = {792--807},
|
||
}
|
||
|
||
@InProceedings{GMW87,
|
||
author = {Goldreich, Oded and Micali, Silvio and Wigderson, Avi},
|
||
title = {How to play any mental game or a completeness theorem for protocols with honest majority},
|
||
booktitle = {STOC},
|
||
year = {1987},
|
||
pages = {218--229},
|
||
}
|
||
|
||
@InProceedings{GV15,
|
||
author = {Gorbunov, S. and Vinayagamurthy, D.},
|
||
title = {Riding on Asymmetry: Efficient ABE for Branching Programs},
|
||
booktitle = {{Asiacrypt}},
|
||
year = {2015},
|
||
}
|
||
|
||
@InProceedings{GH07,
|
||
author = {Green, M. and Hohenberger, S.},
|
||
title = {Blind Identity-Based Encryption and Simulatable Oblivious Transfer},
|
||
booktitle = {{Asiacrypt}},
|
||
year = {2007},
|
||
volume = {4833},
|
||
series = {LNCS},
|
||
pages = {265--282},
|
||
}
|
||
|
||
@InProceedings{GH11,
|
||
author = {Green, M. and Hohenberger, S.},
|
||
title = {Practical Adaptive Oblivious Transfer from Simple Assumptions},
|
||
booktitle = {{TCC}},
|
||
year = {2011},
|
||
volume = {6597},
|
||
series = {LNCS},
|
||
pages = {347--363},
|
||
}
|
||
|
||
@Article{Her11,
|
||
author = {Herranz, J.},
|
||
title = {Restricted Adaptive Oblivious Transfer},
|
||
year = {2011},
|
||
volume = {412},
|
||
number = {46},
|
||
pages = {6498--6506},
|
||
journaltitle = {Theoretical Computer Science},
|
||
}
|
||
|
||
@InProceedings{HAO15,
|
||
author = {Hiromasa, R. and Abe, M. and Okamoto, T.},
|
||
title = {Packing Messages and Optimizing Bootstrapping in {GSW-FHE}},
|
||
booktitle = {{PKC}},
|
||
year = {2015},
|
||
number = {9020},
|
||
series = {LNCS},
|
||
pages = {699--715},
|
||
chapter = {Hiromasa, R. and Abe, M. and Okamoto, T.},
|
||
}
|
||
|
||
@Misc{Inu12a,
|
||
author = {Inutile, Club},
|
||
title = {The Password Security Checker},
|
||
howpublished = {Website, available at {\url{http://inutile.club/estatis/password-security-checker/}}},
|
||
year = {2012},
|
||
}
|
||
|
||
@InProceedings{IP07,
|
||
author = {Yuval Ishai and Anat Paskin},
|
||
title = {Evaluating Branching Programs on Encrypted Data},
|
||
booktitle = {{TCC}},
|
||
year = {2007},
|
||
}
|
||
|
||
@InProceedings{JL09,
|
||
author = {Jarecki, S. and Liu, X.},
|
||
title = {Efficient Oblivious Pseudorandom Function with Applications to Adaptive {OT} and Secure Computation of Set Intersection},
|
||
booktitle = {{TCC}},
|
||
year = {2009},
|
||
volume = {5444},
|
||
series = {LNCS},
|
||
pages = {577--594},
|
||
}
|
||
|
||
@InProceedings{JS07,
|
||
author = {Jarecki, S. and Shmatikov, V.},
|
||
title = {Efficient Two-Party Secure Computation on Committed Inputs},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2007},
|
||
volume = {4515},
|
||
series = {LNCS},
|
||
pages = {97--114},
|
||
}
|
||
|
||
@InProceedings{Kil88,
|
||
author = {Kilian, J.},
|
||
title = {Founding Cryptography on Oblivious Transfer},
|
||
booktitle = {{STOC}},
|
||
year = {1988},
|
||
}
|
||
|
||
@InProceedings{KP06,
|
||
author = {Kunz-Jacques, S{\'{e}}bastien and Pointcheval, David},
|
||
title = {About the security of {MTI/C0} and {MQV}},
|
||
booktitle = {SCN'06},
|
||
year = {2006},
|
||
editor = {Springer},
|
||
pages = {156--172},
|
||
}
|
||
|
||
@InProceedings{KN09,
|
||
author = {Kurosawa, K. and Nojima, R.},
|
||
title = {Simple Adaptive Oblivious Transfer Without Random Oracle},
|
||
booktitle = {{Asiacrypt}},
|
||
year = {2009},
|
||
volume = {5912},
|
||
series = {LNCS},
|
||
pages = {334--346},
|
||
}
|
||
|
||
@InProceedings{KPN10,
|
||
author = {Kurosawa, K. and Phong, L. and Nojima, R.},
|
||
title = {Efficiency-Improved Fully Simulatable Adaptive {OT} under the {DDH} Assumption},
|
||
booktitle = {{SCN}},
|
||
year = {2010},
|
||
volume = {6280},
|
||
series = {LNCS},
|
||
pages = {172--181},
|
||
}
|
||
|
||
@InProceedings{KPN11,
|
||
author = {Kurosawa, K. and Phong, L. and Nojima, R.},
|
||
title = {Generic Fully Simulatable Adaptive Oblivious Transfer},
|
||
booktitle = {{ACNS}},
|
||
year = {2011},
|
||
volume = {6715},
|
||
series = {LNCS},
|
||
pages = {274--291},
|
||
}
|
||
|
||
@InProceedings{LOS+10,
|
||
author = {Lewko, A. and Okamoto, T. and Sahai, A. and Takashima, K. and Waters, B.},
|
||
title = {Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2010},
|
||
number = {6110},
|
||
series = {LNCS},
|
||
}
|
||
|
||
@InProceedings{LLM+16,
|
||
author = {Libert, B. and Ling, S. and Mouhartem, F. and Nguyen, K. and Wang, H.},
|
||
title = {Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions},
|
||
booktitle = {{Asiacrypt}},
|
||
year = {2016},
|
||
url = {http://ia.cr/2016/101},
|
||
}
|
||
|
||
@InProceedings{LLM+16a,
|
||
author = {Libert, B. and Ling, S. and Mouhartem, F. and Nguyen, K. and Wang, H.},
|
||
title = {Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption},
|
||
booktitle = {{Asiacrypt}},
|
||
year = {2016},
|
||
url = {https://ia.cr/2016/879},
|
||
}
|
||
|
||
@Article{Lin08,
|
||
author = {Lindell, Andrew Y.},
|
||
title = {Efficient Fully-Simulatable Oblivious Transfer},
|
||
year = {2008},
|
||
journaltitle = {CT-RSA},
|
||
series = {LNCS},
|
||
}
|
||
|
||
@InProceedings{LNW15a,
|
||
author = {Ling, San and Nguyen, Khoa and Wang, Huaxiong},
|
||
title = {Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based},
|
||
booktitle = {PKC},
|
||
year = {2015},
|
||
volume = {9020},
|
||
series = {LNCS},
|
||
pages = {427--449},
|
||
doi = {10.1007/978-3-662-46447-2_19},
|
||
isbn = {978-3-662-46446-5},
|
||
language = {English},
|
||
url = {http://dx.doi.org/10.1007/978-3-662-46447-2_19},
|
||
}
|
||
|
||
@Article{Lip08,
|
||
author = {Helger Lipmaa},
|
||
title = {Private Branching Programs: On Communication-Efficient Cryptocomputing},
|
||
year = {2008},
|
||
volume = {2008},
|
||
pages = {107},
|
||
bibsource = {dblp computer science bibliography, http://dblp.org},
|
||
biburl = {http://dblp.uni-trier.de/rec/bib/journals/iacr/Lipmaa08},
|
||
journaltitle = {{IACR} Cryptology ePrint Archive},
|
||
url = {https://ia.cr/2008/107},
|
||
}
|
||
|
||
@InProceedings{Mer89,
|
||
author = {Ralph C. Merkle},
|
||
title = {{A Certified Digital Signature}},
|
||
booktitle = {{Crypto}},
|
||
year = {1989},
|
||
}
|
||
|
||
@InProceedings{MRV99,
|
||
author = {Micali, S. and Rabin, M. and Vadhan, S.},
|
||
title = {Verifiable Random Functions},
|
||
booktitle = {FOCS},
|
||
year = {1999},
|
||
pages = {120--130},
|
||
}
|
||
|
||
@InProceedings{MS95,
|
||
author = {Micali, S. and Sidney, R.},
|
||
title = {A simple method for generating and sharing pseudo-random functions},
|
||
booktitle = {{Crypto}},
|
||
year = {1995},
|
||
volume = {963},
|
||
series = {LNCS},
|
||
pages = {185196},
|
||
}
|
||
|
||
@InProceedings{MGGR13,
|
||
author = {Miers, I. and Garman, C. and Green, M. and Rubin, A.},
|
||
title = {Zerocoin: Anonymous Distributed E-Cash from Bitcoin},
|
||
booktitle = {{IEEE Security \& Privacy}},
|
||
year = {2013},
|
||
pages = {397--411},
|
||
}
|
||
|
||
@InProceedings{MW16,
|
||
author = {Mukherjee, P. and Wichs, D.},
|
||
title = {Two Round Mutliparty Computation via Multi-Key FHE},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2016},
|
||
series = {LNCS},
|
||
note = {To appear},
|
||
}
|
||
|
||
@Misc{Nak,
|
||
author = {Nakamoto, S.},
|
||
title = {Bitcoin: A peer-to-peer electronic cash system},
|
||
howpublished = {\url{www.bitcoin.org}},
|
||
}
|
||
|
||
@InProceedings{NP01,
|
||
author = {Naor, Moni and Pinkas, Benny},
|
||
title = {Efficient oblivious transfer protocols.},
|
||
booktitle = {SODA},
|
||
year = {2001},
|
||
pages = {448--457},
|
||
}
|
||
|
||
@Article{NP05,
|
||
author = {Naor, M. and Pinkas, B.},
|
||
title = {Computationally Secure Oblivious Transfer},
|
||
year = {2005},
|
||
volume = {18},
|
||
number = {1},
|
||
pages = {1--35},
|
||
journaltitle = {Journal of Cryptology},
|
||
}
|
||
|
||
@InProceedings{NP99,
|
||
author = {Naor, M. and Pinkas, B.},
|
||
title = {Oblivious transfer with adaptive queries},
|
||
booktitle = {{Crypto}},
|
||
year = {1999},
|
||
volume = {1666},
|
||
series = {LNCS},
|
||
pages = {573--590},
|
||
}
|
||
|
||
@InProceedings{NPR99,
|
||
author = {Naor, M. and Pinkas, B. and Reingold, O.},
|
||
title = {Distributed Pseudo-random Functions and KDCs},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {1999},
|
||
volume = {1592},
|
||
series = {LNCS},
|
||
pages = {327--346},
|
||
}
|
||
|
||
@Article{NR04,
|
||
author = {Naor, M. and Reingold, O.},
|
||
title = {Number-theoretic constructions of efficient pseudo-random functions},
|
||
year = {2004},
|
||
volume = {51},
|
||
pages = {231--262},
|
||
journaltitle = {Journal of the ACM},
|
||
}
|
||
|
||
@InProceedings{NYO08,
|
||
author = {Nishide, T. and Yoneyama, K. and Ohta, K.},
|
||
title = {Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures},
|
||
booktitle = {{ACNS}'08},
|
||
year = {2008},
|
||
number = {5037},
|
||
series = {LNCS},
|
||
pages = {111--129},
|
||
}
|
||
|
||
@InProceedings{OO89,
|
||
author = {Ohta, K. and Okamoto, T.},
|
||
title = {Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash},
|
||
booktitle = {{Crypto}},
|
||
year = {1989},
|
||
volume = {435},
|
||
series = {LNCS},
|
||
pages = {481--496},
|
||
}
|
||
|
||
@InProceedings{OO91,
|
||
author = {Ohta, K. and Okamoto, T.},
|
||
title = {Universal Electronic Cash},
|
||
booktitle = {{Crypto}},
|
||
year = {1991},
|
||
volume = {576},
|
||
series = {LNCS},
|
||
pages = {324--337},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{Oka95,
|
||
author = {Okamoto, T.},
|
||
title = {An Efficient Divisible Electronic Cash Scheme},
|
||
booktitle = {{Crypto}},
|
||
year = {1995},
|
||
volume = {963},
|
||
series = {LNCS},
|
||
pages = {438--451},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{Pai92,
|
||
author = {Pailles, J.-C.},
|
||
title = {New Protocols for Electronic Money},
|
||
booktitle = {{Auscrypt}},
|
||
year = {1992},
|
||
volume = {718},
|
||
series = {LNCS},
|
||
pages = {263--274},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@Misc{Pei15a,
|
||
author = {Peikert, Chris},
|
||
title = {A Decade of Lattice Cryptography},
|
||
howpublished = {Cryptology ePrint Archive: Report 2015/939},
|
||
year = {2015},
|
||
}
|
||
|
||
@InProceedings{PVW08,
|
||
author = {Peikert, C. and Vaikuntanathan, V. and Waters, B.},
|
||
title = {A Framework for Efficient and Composable Oblivious Transfer},
|
||
booktitle = {{Crypto}},
|
||
year = {2008},
|
||
volume = {5157},
|
||
series = {LNCS},
|
||
pages = {554--571},
|
||
}
|
||
|
||
@Misc{Rab81,
|
||
author = {Rabin, M.},
|
||
title = {How to exchange secrets by oblivious transfer},
|
||
howpublished = {Technical Report TR-81, Aiken Computation Laboratory, Harvard University},
|
||
year = {1981},
|
||
}
|
||
|
||
@Article{Reg09,
|
||
author = {Oded Regev},
|
||
title = {{On Lattices, Learning with Errors, Random Linear Codes, and Cryptography}},
|
||
year = {2009},
|
||
volume = {56},
|
||
number = {6},
|
||
bibsource = {DBLP, http://dblp.uni-trier.de},
|
||
ee = {http://doi.acm.org/10.1145/1568318.1568324},
|
||
journaltitle = {Journal of the ACM},
|
||
}
|
||
|
||
@InProceedings{RKP09,
|
||
author = {Alfredo Rial and Markulf Kohlweiss and Bart Preneel},
|
||
title = {Universally composable adaptive priced oblivious transfer},
|
||
booktitle = {Pairing'09},
|
||
year = {2009},
|
||
editor = {Springer},
|
||
series = {LNCS},
|
||
pages = {231--247},
|
||
}
|
||
|
||
@InProceedings{Rue10,
|
||
author = {R\"uckert, M.},
|
||
title = {Lattice-Based Blind Signatures},
|
||
booktitle = {{Asiacrypt}},
|
||
year = {2010},
|
||
volume = {6477},
|
||
series = {LNCS},
|
||
pages = {413--430},
|
||
}
|
||
|
||
@InProceedings{SW05,
|
||
author = {Sahai, A. and Waters, B.},
|
||
title = {Fuzzy Identity-Based Encryption},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2005},
|
||
number = {3494},
|
||
series = {LNCS},
|
||
pages = {457--473},
|
||
}
|
||
|
||
@InProceedings{SSE+12a,
|
||
author = {Sakai, Y. and Schuldt, J. and Emura, K. and Hanaoka, G. and Ohta, K.},
|
||
title = {On the Security of Dynamic Group Signatures: Preventing Signature Hijacking},
|
||
booktitle = {PKC},
|
||
year = {2012},
|
||
volume = {7293},
|
||
series = {LNCS},
|
||
pages = {715--732},
|
||
edition = {Springer},
|
||
}
|
||
|
||
@Article{vSN92,
|
||
author = {von Solms, S. and Naccache, D.},
|
||
title = {On blind signatures and perfect crimes},
|
||
year = {1992},
|
||
volume = {11},
|
||
pages = {581583},
|
||
journaltitle = {Computers \& Security},
|
||
}
|
||
|
||
@InProceedings{Tau05,
|
||
author = {Tauman-Kalai, Y.},
|
||
title = {Smooth Projective Hashing and Two-Message Oblivious Transfer},
|
||
booktitle = {{Eurocrypt}'05},
|
||
year = {2005},
|
||
number = {3494},
|
||
series = {LNCS},
|
||
pages = {78--95},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@PhdThesis{Tsi97,
|
||
author = {Tsiounis, Y.},
|
||
title = {Efficient Electronic Cash: New Notions and Techniques},
|
||
year = {1997},
|
||
howpublished = {PhD thesis, Northeastern University},
|
||
institution = {Northeastern University},
|
||
}
|
||
|
||
@InProceedings{ZAW+10,
|
||
author = {Zhang, Y. and Au, M.-H. and Wong, D. and Huang, Q. and Mamoulis, N. and Cheung, D. and Yiu, S.-M.},
|
||
title = {Oblivious Transfer with Access Control: Realizing Disjunction without Duplication},
|
||
booktitle = {{Pairing}},
|
||
year = {2010},
|
||
number = {6847},
|
||
series = {LNCS},
|
||
pages = {96--115},
|
||
}
|
||
|
||
@InProceedings{ACD+12,
|
||
author = {Masayuki Abe and Melissa Chase and Bernardo David and Markulf Kohlweiss and Ryo Nishimaki and Miyako Ohkubo},
|
||
title = {Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions},
|
||
booktitle = {{Asiacrypt}},
|
||
year = {2012},
|
||
volume = {7658},
|
||
number = {7658},
|
||
series = {LNCS},
|
||
pages = {4--24},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{AFG+10,
|
||
author = {Masayuki Abe and Georg Fuchsbauer and Jens Groth and Kristiyan Haralambiev and Miyako Ohkubo},
|
||
title = {Structure-Preserving Signatures and Commitments to Group Elements},
|
||
booktitle = {{Crypto}},
|
||
year = {2010},
|
||
volume = {6223},
|
||
number = {6223},
|
||
series = {LNCS},
|
||
pages = {209--236},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{ABB10,
|
||
author = {Agrawal, S. and Boneh, D. and Boyen, X.},
|
||
title = {Efficient Lattice {(H)IBE} in the Standard Model},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2010},
|
||
volume = {6110},
|
||
series = {LNCS},
|
||
pages = {553--572},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{ABB+13,
|
||
author = {Carlos Aguilar-Melchor and Slim Bettaieb and Xavier Boyen and Laurent Fousse and Philippe Gaborit},
|
||
title = {Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting},
|
||
booktitle = {{Africacrypt}},
|
||
year = {2013},
|
||
volume = {7918},
|
||
series = {LNCS},
|
||
pages = {1--25},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{AP09,
|
||
author = {Alwen, J. and Peikert, C.},
|
||
title = {Generating shorter bases for hard random lattices},
|
||
booktitle = {{STACS}},
|
||
year = {2009},
|
||
volume = {3},
|
||
series = {LNCS},
|
||
pages = {75--86},
|
||
publisher = {Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany},
|
||
}
|
||
|
||
@InProceedings{AJL+12,
|
||
author = {Asharov, G. and Jain, A. and Lopez-Alt, A. and Tromer, E. and Vaikuntanathan, V. and Wichs, D.},
|
||
title = {Multiparty Computation with Low Communication, Computation and Interaction via Threshold {FHE}},
|
||
booktitle = {Eurocrypt},
|
||
year = {2012},
|
||
volume = {7237},
|
||
series = {LNCS},
|
||
pages = {483--501},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{ACJT00,
|
||
author = {Ateniese, Giuseppe and Camenisch, Jan and Joye, Marc and Tsudik, Gene},
|
||
title = {A practical and provably secure coalition-resistant group signature scheme},
|
||
booktitle = {Crypto},
|
||
year = {2000},
|
||
volume = {1880},
|
||
series = {LNCS},
|
||
pages = {255--270},
|
||
organization = {Springer},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{AT99,
|
||
author = {Ateniese, Giuseppe and Tsudik, Gene},
|
||
title = {Some open issues and new directions in group signatures},
|
||
booktitle = {Financial Cryptography},
|
||
year = {1999},
|
||
pages = {196--211},
|
||
organization = {Springer},
|
||
}
|
||
|
||
@Article{BHJ+15,
|
||
author = {B{\"o}hl, Florian and Hofheinz, Dennis and Jager, Tibor and Koch, Jessica and Striecks, Christoph},
|
||
title = {{Confined guessing: New signatures from standard assumptions}},
|
||
journal = {Journal of Cryptology},
|
||
year = {2015},
|
||
volume = {28},
|
||
number = {1},
|
||
pages = {176--208},
|
||
journaltitle = {Journal of Cryptology},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{BLL+15,
|
||
author = {Bai, Shi and Langlois, Adeline and Lepoint, Tancr\`ede and Stehl\'e, Damien and Steinfeld, Ron},
|
||
title = {Improved Security Proofs in Lattice-Based Cryptography: Using the {R\'enyi} Divergence Rather Than the Statistical Distance},
|
||
booktitle = {{Asiacrypt}},
|
||
year = {2015},
|
||
volume = {9452},
|
||
series = {LNCS},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@Article{Ban93,
|
||
author = {Banaszczyk, W.},
|
||
title = {New bounds in some transference theorems in the geometry of number},
|
||
year = {1993},
|
||
volume = {296},
|
||
pages = {625--635},
|
||
eid = {Springer},
|
||
journaltitle = {Mathematische Annalen},
|
||
}
|
||
|
||
@InProceedings{BP97,
|
||
author = {Niko Baric and Birgit Pfitzmann},
|
||
title = {{Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees}},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {1997},
|
||
volume = {1233},
|
||
series = {LNCS},
|
||
pages = {480--494},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{BCC+09,
|
||
author = {Mira Belenkiy and Jan Camenisch and Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Hovav Shacham},
|
||
title = {Randomizable Proofs and Delegatable Anonymous Credentials},
|
||
booktitle = {{Crypto}},
|
||
year = {2009},
|
||
volume = {5677},
|
||
series = {LNCS},
|
||
pages = {108--125},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{BMW03,
|
||
author = {Bellare, Mihir and Micciancio, Daniele and Warinschi, Bogdan},
|
||
title = {Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2003},
|
||
volume = {3376},
|
||
number = {2656},
|
||
series = {LNCS},
|
||
pages = {614--629},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{BSZ05,
|
||
author = {Bellare, Mihir and Shi, Haixia and Zhang, Chong},
|
||
title = {Foundations of group signatures: The case of dynamic groups},
|
||
booktitle = {{CT-RSA}},
|
||
year = {2005},
|
||
volume = {2656},
|
||
number = {3376},
|
||
series = {LNCS},
|
||
pages = {136--153},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{BCK+14,
|
||
author = {Benhamouda, Fabrice and Camenisch, Jan and Krenn, Stephan and Lyubashevsky, Vadim and Neven, Gregory},
|
||
title = {Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures},
|
||
booktitle = {{Asiacrypt}},
|
||
year = {2014},
|
||
number = {8873},
|
||
series = {LNCS},
|
||
pages = {551--572},
|
||
publisher = Springer,
|
||
}
|
||
|
||
@InProceedings{BKLP15,
|
||
author = {Fabrice Benhamouda and Stephan Krenn and Vadim Lyubashevsky and Krzysztof Pietrzak},
|
||
title = {Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings},
|
||
booktitle = {{ESORICS}},
|
||
year = {2015},
|
||
volume = {9326},
|
||
series = {LNCS},
|
||
pages = {305--325},
|
||
publisher = {Springer},
|
||
note = {to appear},
|
||
}
|
||
|
||
@Article{BKLP14,
|
||
author = {Fabrice Benhamouda and Stephan Krenn and Vadim Lyubashevsky and Krzysztof Pietrzak},
|
||
title = {{Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings}},
|
||
year = {2014},
|
||
volume = {2014},
|
||
pages = {889},
|
||
journaltitle = {{IACR} Cryptology ePrint Archive},
|
||
url = {https://ia.cr/2014/889},
|
||
}
|
||
|
||
@InProceedings{BB04,
|
||
author = {D. Boneh and X. Boyen},
|
||
title = {Efficient Selective-{ID} Secure Identity-Based Encryption Without Random Oracles},
|
||
booktitle = {{E}urocrypt},
|
||
year = {2004},
|
||
volume = {3027},
|
||
series = {LNCS},
|
||
pages = {223--238},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{BBS04,
|
||
author = {Boneh, Dan and Boyen, Xavier and Shacham, Hovav},
|
||
title = {Short group signatures},
|
||
booktitle = {{Crypto}},
|
||
year = {2004},
|
||
volume = {3152},
|
||
series = {LNCS},
|
||
pages = {41--55},
|
||
organization = {Springer},
|
||
}
|
||
|
||
@InProceedings{BS04,
|
||
author = {Boneh, Dan and Shacham, Hovav},
|
||
title = {Group signatures with verifier-local revocation},
|
||
booktitle = {{ACM-CCS}},
|
||
year = {2004},
|
||
pages = {168--177},
|
||
organization = {ACM},
|
||
}
|
||
|
||
@InProceedings{Boy10,
|
||
author = {Boyen, Xavier},
|
||
title = {Lattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more},
|
||
booktitle = {{PKC}},
|
||
year = {2010},
|
||
volume = {6056},
|
||
series = {LNCS},
|
||
pages = {499--517},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{BW07,
|
||
author = {X. Boyen and B. Waters},
|
||
title = {Full-Domain Subgroup Hiding and Constant-Size Group Signatures},
|
||
booktitle = {{PKC}},
|
||
year = {2007},
|
||
volume = {4450},
|
||
series = {LNCS},
|
||
pages = {1--15},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{BW06,
|
||
author = {X. Boyen and B. Waters},
|
||
title = {Compact Group Signatures Without Random Oracles},
|
||
booktitle = {{E}urocrypt},
|
||
year = {2006},
|
||
volume = {4004},
|
||
series = {LNCS},
|
||
pages = {427--444},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@Article{BK10,
|
||
author = {Zvika Brakerski and Yael Tauman Kalai},
|
||
title = {A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model},
|
||
year = {2010},
|
||
volume = {2010},
|
||
pages = {86},
|
||
bibsource = {DBLP, http://dblp.uni-trier.de},
|
||
ee = {https://ia.cr/2010/086},
|
||
journaltitle = {IACR Cryptology ePrint Archive},
|
||
}
|
||
|
||
@InProceedings{BLP+13,
|
||
author = {Brakerski, Z. and Langlois, A. and Peikert, C. and Regev, O. and Stehl{\'e}, D.},
|
||
title = {On the classical hardness of learning with errors},
|
||
booktitle = {{STOC}},
|
||
year = {2013},
|
||
pages = {575--584},
|
||
publisher = {ACM},
|
||
}
|
||
|
||
@InProceedings{BPVY00,
|
||
author = {Brickell, E. and Pointcheval, D. and Vaudenay, S. and Yung, M.},
|
||
title = {Design Validations for Discrete Logarithm Based Signature Schemes},
|
||
booktitle = {{PKC}},
|
||
year = {2000},
|
||
volume = {1751},
|
||
series = {LNCS},
|
||
pages = {276--292},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{CDHK15,
|
||
author = {Camenisch, J. and Dubovitskaya, M. and Haralambiev, K. and Kohlweiss, M.},
|
||
title = {Composable and Modular Anonymous Credentials: Definitions and Practical Constructions},
|
||
booktitle = {{Asiacrypt}},
|
||
year = {2015},
|
||
series = {LNCS},
|
||
publisher = {Springer},
|
||
url = {https://ia.cr/2015/580},
|
||
}
|
||
|
||
@InProceedings{CG08,
|
||
author = {Camenisch, Jan and Gross, Thomas},
|
||
title = {Efficient attributes for anonymous credentials},
|
||
booktitle = {{ACM-CCS}},
|
||
year = {2008},
|
||
pages = {345--356},
|
||
publisher = {ACM},
|
||
}
|
||
|
||
@InProceedings{CHL05a,
|
||
author = {Camenisch, Jan and Hohenberger, Susan and Lysyanskaya, Anna},
|
||
title = {Compact e-cash},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2005},
|
||
number = {3494},
|
||
series = {LNCS},
|
||
pages = {302--321},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{CKY09,
|
||
author = {Camenisch, Jan and Kiayias, Aggelos and Yung, Moti},
|
||
title = {On the Portability of Generalized {Schnorr} Proofs},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2009},
|
||
number = {5479},
|
||
series = {LNCS},
|
||
pages = {425--442},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{CKL+15,
|
||
author = {Camenisch, J. and Krenn, S. and Lehmann, A. and Mikkelsen, G.-L. and Neven, G. and Pedersen, M.-0.},
|
||
title = {Formal Treatment of Privacy-Enhancing Credential Systems},
|
||
booktitle = {{SAC}},
|
||
year = {2015},
|
||
series = {LNCS},
|
||
pages = {3--24},
|
||
publisher = {Springer},
|
||
url = {https://ia.cr/2014/708},
|
||
}
|
||
|
||
@InProceedings{CL02b,
|
||
author = {Jan Camenisch and Anna Lysyanskaya},
|
||
title = {Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials},
|
||
booktitle = {{Crypto}},
|
||
year = {2002},
|
||
volume = {2442},
|
||
series = {LNCS},
|
||
pages = {61--76},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{CL01,
|
||
author = {Camenisch, Jan and Lysyanskaya, Anna},
|
||
title = {An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2001},
|
||
number = {2045},
|
||
series = {LNCS},
|
||
pages = {93--118},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{CNR12,
|
||
author = {J. Camenisch and G. Neven and M. R{\"u}ckert},
|
||
title = {Fully Anonymous Attribute Tokens from Lattices},
|
||
booktitle = {{SCN}},
|
||
year = {2012},
|
||
volume = {7485},
|
||
series = {LNCS},
|
||
pages = {57--75},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{CHKP10,
|
||
author = {Cash, D. and Hofheinz, D. and Kiltz, E. and Peikert, C.},
|
||
title = {Bonsai Trees, or How to Delegate a Lattice Basis},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2010},
|
||
volume = {6110},
|
||
series = {LNCS},
|
||
pages = {523--552},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{CLY09,
|
||
author = {Julien Cathalo and Beno\^it Libert and Moti Yung},
|
||
title = {Group Encryption: Non-Interactive Realization in the Standard Model},
|
||
booktitle = {{Asiacrypt}},
|
||
year = {2009},
|
||
number = {5912},
|
||
series = {LNCS},
|
||
pages = {179--196},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{CMZ14,
|
||
author = {Melissa Chase and Sarah Meiklejohn and Greg Zaverucha},
|
||
title = {Algebraic MACs and Keyed-Verification Anonymous Credentials},
|
||
booktitle = {{ACM-CCS}},
|
||
year = {2014},
|
||
pages = {1205--1216},
|
||
publisher = {ACM},
|
||
}
|
||
|
||
@Article{Cha85,
|
||
author = {Chaum, David},
|
||
title = {Security without Identification: Transactions ssystem to make big brother obsolete},
|
||
year = {1985},
|
||
volume = {28},
|
||
number = {10},
|
||
pages = {1030--1044},
|
||
journaltitle = {Communications of the {ACM}},
|
||
}
|
||
|
||
@InProceedings{CVH91,
|
||
author = {Chaum, David and Van Heyst, Eug{\`e}ne},
|
||
title = {Group signatures},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {1991},
|
||
volume = {547},
|
||
series = {LNCS},
|
||
pages = {257--265},
|
||
organization = {Springer},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{CVH91a,
|
||
author = {Chaum, David and Van Heyst, Eug{\`e}ne},
|
||
title = {Group signatures},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {1991},
|
||
volume = {547},
|
||
series = {LNCS},
|
||
pages = {257--265},
|
||
organization = {Springer},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{Dam00,
|
||
author = {Damg{\aa}rd, I.},
|
||
title = {Efficient Concurrent Zero-Knowledge in the Auxiliary String Model},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2000},
|
||
volume = {1807},
|
||
series = {LNCS},
|
||
pages = {418--430},
|
||
publisher = {Springer},
|
||
edition = {Springer},
|
||
}
|
||
|
||
@InProceedings{DHKT08,
|
||
author = {Damg{\aa}rd, I. and Hofheinz, D. and Kiltz, E. and Thorbek, R.},
|
||
title = {Public-key encryption with non-interactive opening},
|
||
booktitle = {{CT-RSA}},
|
||
year = {2008},
|
||
volume = {4964},
|
||
series = {LNCS},
|
||
pages = {239--255},
|
||
publisher = {Springer},
|
||
edition = {Springer},
|
||
}
|
||
|
||
@InProceedings{DT07,
|
||
author = {Damg{\aa}rd, I. and Thorbek, R.},
|
||
title = {Non-interactive Proofs for Integer Multiplication},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2007},
|
||
volume = {4515},
|
||
series = {LNCS},
|
||
pages = {412--429},
|
||
publisher = {Springer},
|
||
edition = {Springer},
|
||
}
|
||
|
||
@InProceedings{DP06,
|
||
author = {Delerabl{\'e}e, C{\'e}cile and Pointcheval, David},
|
||
title = {Dynamic fully anonymous short group signatures},
|
||
booktitle = {VietCrypt},
|
||
year = {2006},
|
||
volume = {4341},
|
||
number = {4341},
|
||
series = {LNCS},
|
||
pages = {193--210},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@Article{DZ09,
|
||
author = {Delgrossi, Luca and Zhang, Tao},
|
||
title = {Dedicated Short-Range Communications},
|
||
year = {2009},
|
||
pages = {44--51},
|
||
journaltitle = {Vehicle Safety Communications: Protocols, Security, and Privacy},
|
||
publisher = {Wiley Online Library},
|
||
}
|
||
|
||
@InProceedings{ELL+15,
|
||
author = {Martianus Frederic Ezerman and Hyung Tae Lee and San Ling and Khoa Nguyen and Huaxiong Wang},
|
||
title = {A Provably Secure Group Signature Scheme from Code-Based Assumptions},
|
||
booktitle = {{Asiacrypt}'15},
|
||
year = {2015},
|
||
volume = {9452},
|
||
series = {LNCS},
|
||
pages = {260--285},
|
||
publisher = {Springer},
|
||
howpublished = {Cryptology ePrint Archive, Report 2015/479},
|
||
}
|
||
|
||
@InProceedings{FS86,
|
||
author = {Fiat, Amos and Shamir, Adi},
|
||
title = {How To Prove Yourself: Practical Solutions to Identification and Signature Problems},
|
||
booktitle = {Crypto},
|
||
year = {1986},
|
||
editor = {Odlyzko, Andrew M.},
|
||
pages = {186--194},
|
||
publisher = {Springer},
|
||
isbn = {978-3-540-47721-1},
|
||
}
|
||
|
||
@InProceedings{GLF+10,
|
||
author = {Galindo, D. and Libert, B. and Fischlin, M. and Fuchsbauer, G. and Lehmann, A. and Manulis, M. and Schr\"oder, D.},
|
||
title = {Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions},
|
||
booktitle = {{Africacrypt}},
|
||
year = {2010},
|
||
volume = {6055},
|
||
series = {LNCS},
|
||
pages = {333--350},
|
||
publisher = {Springer},
|
||
edition = Springer,
|
||
}
|
||
|
||
@InProceedings{Gen09,
|
||
author = {Gentry, C.},
|
||
title = {Fully homomorphic encryption using ideal lattices},
|
||
booktitle = {{STOC}},
|
||
year = {2009},
|
||
pages = {169--178},
|
||
publisher = {ACM},
|
||
}
|
||
|
||
@InProceedings{GPV08,
|
||
author = {Gentry, C. and Peikert, C. and Vaikuntanathan, V.},
|
||
title = {Trapdoors for hard lattices and new cryptographic constructions},
|
||
booktitle = {{STOC}},
|
||
year = {2008},
|
||
pages = {197--206},
|
||
publisher = {{ACM}},
|
||
}
|
||
|
||
@InProceedings{GMR85,
|
||
author = {Goldwasser, Shafi and Micali, Silvio and Rackoff, Charles},
|
||
title = {The knowledge complexity of interactive proof-systems},
|
||
booktitle = {{STOC}},
|
||
year = {1985},
|
||
pages = {291--304},
|
||
organization = {ACM},
|
||
publisher = {{ACM}},
|
||
}
|
||
|
||
@InProceedings{GVW15,
|
||
author = {Gorbunov, S. and Vaikuntanathan, V. and Wee, H.},
|
||
title = {Predicate Encryption for Circuits from {LWE}},
|
||
booktitle = {{Crypto}},
|
||
year = {2015},
|
||
number = {9216},
|
||
series = {LNCS},
|
||
pages = {503--523},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{GVW13,
|
||
author = {Gorbunov, S. and Vaikuntanathan, V. and Wee, H.},
|
||
title = {Attribute-based encryption for circuits},
|
||
booktitle = {{STOC}},
|
||
year = {2013},
|
||
pages = {545--554},
|
||
publisher = {ACM},
|
||
}
|
||
|
||
@InProceedings{GKV10,
|
||
author = {Gordon, S Dov and Katz, Jonathan and Vaikuntanathan, Vinod},
|
||
title = {A group signature scheme from lattice assumptions},
|
||
booktitle = {{Asiacrypt}},
|
||
year = {2010},
|
||
volume = {2647},
|
||
series = {LNCS},
|
||
pages = {395--412},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{GH08,
|
||
author = {Matthew Green and Susan Hohenberger},
|
||
title = {Universally Composable Adaptive Oblivious Transfer},
|
||
booktitle = {{Asiacrypt}},
|
||
year = {2008},
|
||
number = {5350},
|
||
series = {LNCS},
|
||
pages = {179--197},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{Gro07,
|
||
author = {J. Groth},
|
||
title = {Fully Anonymous Group Signatures without Random Oracles},
|
||
booktitle = {{Asiacrypt}},
|
||
year = {2007},
|
||
volume = {4833},
|
||
series = {LNCS},
|
||
pages = {164--180},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{GS08,
|
||
author = {J. Groth and A. Sahai},
|
||
title = {Efficient Non-interactive Proof Systems for Bilinear Groups},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2008},
|
||
volume = {4965},
|
||
series = {LNCS},
|
||
pages = {415--432},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{HW09,
|
||
author = {Hohenberger, S. and Waters, B.},
|
||
title = {Short and Stateless Signatures from the {RSA} Assumption},
|
||
booktitle = {{Crypto}},
|
||
year = {2009},
|
||
volume = {5677},
|
||
series = {LNCS},
|
||
pages = {654--670},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{JKPT12,
|
||
author = {Jain, A. and Krenn, S. and Pietrzak, K. and Tentes, A.},
|
||
title = {Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise},
|
||
booktitle = {{Asiacrypt}},
|
||
year = {2012},
|
||
volume = {7658},
|
||
series = {LNCS},
|
||
pages = {663--680},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{KTX08,
|
||
author = {Kawachi, A. and Tanaka, K. and Xagawa, K.},
|
||
title = {Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems},
|
||
booktitle = {{Asiacrypt}},
|
||
year = {2008},
|
||
volume = {5350},
|
||
series = {LNCS},
|
||
pages = {372--389},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{KTY07,
|
||
author = {Aggelos Kiayias and Yiannis Tsiounis and Moti Yung},
|
||
title = {Group Encryption},
|
||
booktitle = {{Asiacrypt}},
|
||
year = {2007},
|
||
number = {4833},
|
||
series = {LNCS},
|
||
pages = {181--199},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@Article{KY06,
|
||
author = {Kiayias, Aggelos and Yung, Moti},
|
||
title = {Secure scalable group signature with dynamic joins and separable authorities},
|
||
year = {2006},
|
||
volume = {1},
|
||
number = {1},
|
||
pages = {24--45},
|
||
journaltitle = {International Journal of Security and Networks},
|
||
publisher = {Inderscience},
|
||
}
|
||
|
||
@InProceedings{KY05,
|
||
author = {Kiayias, Aggelos and Yung, Moti},
|
||
title = {Group Signatures with Efficient Concurrent Join},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2005},
|
||
number = {3494},
|
||
series = {LNCS},
|
||
pages = {198--214},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{LLLS13,
|
||
author = {Laguillaumie, Fabien and Langlois, Adeline and Libert, Beno{\^\i}t and Stehl{\'e}, Damien},
|
||
title = {Lattice-based group signatures with logarithmic signature size},
|
||
booktitle = {{Asiacrypt}},
|
||
year = {2013},
|
||
volume = {8270},
|
||
series = {LNCS},
|
||
pages = {41--61},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{LLNW14,
|
||
author = {Langlois, Adeline and Ling, San and Nguyen, Khoa and Wang, Huaxiong},
|
||
title = {{Lattice-Based Group Signature Scheme with Verifier-Local Revocation}},
|
||
booktitle = {{PKC}},
|
||
year = {2014},
|
||
volume = {8383},
|
||
series = {LNCS},
|
||
pages = {345--361},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{LSS14,
|
||
author = {Langlois, Adeline and Stehl\'e, Damien and Steinfeld, Ron},
|
||
title = {{GGHLite}: More Efficient Multilinear Maps from Ideal Lattices},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2014},
|
||
volume = {8441},
|
||
series = {LNCS},
|
||
pages = {239--256},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{LLNW16,
|
||
author = {Libert, B. and Ling, S. and Nguyen, K. and Wang, H.},
|
||
title = {Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-size Ring Signatures and Group Signatures Without Trapdoors},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2016},
|
||
volume = {9666},
|
||
series = {LNCS},
|
||
pages = {1--31},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{LPY15,
|
||
author = {Beno\^{\i}t Libert and Thomas Peters and Moti Yung},
|
||
title = {Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions},
|
||
booktitle = {{Crypto}},
|
||
year = {2015},
|
||
volume = {9216},
|
||
series = {LNCS},
|
||
pages = {296--316},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{LNSW13,
|
||
author = {Ling, San and Nguyen, Khoa and Stehl{\'e}, Damien and Wang, Huaxiong},
|
||
title = {{Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications}},
|
||
booktitle = {{PKC}},
|
||
year = {2013},
|
||
volume = {7778},
|
||
pages = {107--124},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{LAN02,
|
||
author = {Helger Lipmaa and N. Asokan and Valtteri Niemi},
|
||
title = {{Secure Vickrey Auctions without Threshold Trust}},
|
||
booktitle = {Financial Cryptography},
|
||
year = {2002},
|
||
volume = {2357},
|
||
series = {LNCS},
|
||
pages = {87--101},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{Lyu08,
|
||
author = {Vadim Lyubashevsky},
|
||
title = {Lattice-Based Identification Schemes Secure Under Active Attacks},
|
||
booktitle = {{PKC}},
|
||
year = {2008},
|
||
volume = {4939},
|
||
series = {LNCS},
|
||
pages = {162--179},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{LPR10,
|
||
author = {V. Lyubashevsky and C. Peikert and O. Regev},
|
||
title = {On Ideal Lattices and Learning with Errors over Rings},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2010},
|
||
volume = {6110},
|
||
series = {LNCS},
|
||
pages = {1--23},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{MP12,
|
||
author = {Micciancio, D. and Peikert, C.},
|
||
title = {Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller},
|
||
booktitle = {{Eurocrypt}},
|
||
year = {2012},
|
||
volume = {7237},
|
||
series = {LNCS},
|
||
pages = {700--718},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{MV03,
|
||
author = {Micciancio, D. and Vadhan, S.},
|
||
title = {Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice Problems and More},
|
||
booktitle = {{Crypto}},
|
||
year = {2003},
|
||
volume = {2729},
|
||
series = {LNCS},
|
||
pages = {282--298},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{NZZ15,
|
||
author = {Nguyen, Phong Q and Zhang, Jiang and Zhang, Zhenfeng},
|
||
title = {Simpler Efficient Group Signatures from Lattices},
|
||
booktitle = {{PKC}},
|
||
year = {2015},
|
||
volume = {9020},
|
||
series = {LNCS},
|
||
pages = {401--426},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{Pei09,
|
||
author = {Peikert, C.},
|
||
title = {Public-key cryptosystems from the worst-case shortest vector problem},
|
||
booktitle = {{STOC}},
|
||
year = {2009},
|
||
pages = {333--342},
|
||
publisher = {ACM},
|
||
}
|
||
|
||
@InProceedings{PV08,
|
||
author = {Peikert, C. and Vaikuntanathan, V.},
|
||
title = {Non-interactive Statistical Zero-Knowledge Proofs for Lattice Problems},
|
||
booktitle = {{Crypto}},
|
||
year = {2008},
|
||
volume = {5157},
|
||
series = {LNCS},
|
||
pages = {536--553},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{Reg05,
|
||
author = {Regev, O.},
|
||
title = {On lattices, learning with errors, random linear codes, and cryptography},
|
||
booktitle = {{STOC}},
|
||
year = {2005},
|
||
pages = {84--93},
|
||
publisher = {{ACM}},
|
||
}
|
||
|
||
@InProceedings{RST01,
|
||
author = {Rivest, Ronald L. and Shamir, Adi and Tauman, Yael},
|
||
title = {How to Leak a Secret},
|
||
booktitle = {{Asiacrypt}},
|
||
year = {2001},
|
||
volume = {2248},
|
||
series = {LNCS},
|
||
pages = {552--565},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@Article{Ste96,
|
||
author = {Stern, Jacques},
|
||
title = {A new paradigm for public key identification},
|
||
year = {1996},
|
||
volume = {42},
|
||
number = {6},
|
||
pages = {1757--1768},
|
||
journaltitle = {IEEE Transactions on Information Theory},
|
||
publisher = {IEEE},
|
||
}
|
||
|
||
@InProceedings{XXW13,
|
||
author = {Xie, X. and Xue, R. and Wang, M.},
|
||
title = {Zero Knowledge Proofs from {Ring-LWE}},
|
||
booktitle = {{CANS}},
|
||
year = {2013},
|
||
volume = {8257},
|
||
series = {LNCS},
|
||
pages = {57--73},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@Book{BSS05,
|
||
title = {Advances in elliptic curve cryptography},
|
||
publisher = {Cambridge University Press},
|
||
year = {2005},
|
||
author = {Blake, Ian F and Seroussi, Gadiel and Smart, Nigel P},
|
||
volume = {317},
|
||
}
|
||
|
||
@InProceedings{Che06,
|
||
author = {Jung Hee Cheon},
|
||
title = {Security Analysis of the Strong Diffie-Hellman Problem},
|
||
booktitle = {Eurocrypt},
|
||
year = {2006},
|
||
editor = {Springer},
|
||
volume = {4004},
|
||
series = {LNCS},
|
||
}
|
||
|
||
@Misc{NIS17,
|
||
author = {NIST},
|
||
title = {{NIST post-quantum competition. Round 1.}},
|
||
year = {2017},
|
||
note = {\url{https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Round-1-Submissions}},
|
||
}
|
||
|
||
@Misc{Wun10,
|
||
author = {Thomas Wunderer},
|
||
title = {Lattice Challenge},
|
||
year = {2010},
|
||
note = {\url{https://www.latticechallenge.org/index.php}},
|
||
}
|
||
|
||
@InProceedings{HK17,
|
||
author = {Herold, Gottfried and Kirshanova, Elena},
|
||
title = {Improved Algorithms for the Approximate k-List Problem in {E}uclidean Norm},
|
||
booktitle = {PKC'17},
|
||
year = {2017},
|
||
pages = {16--40},
|
||
publisher = {Springer},
|
||
isbn = {978-3-662-54365-8},
|
||
}
|
||
|
||
@InProceedings{ADRS15,
|
||
author = {Aggarwal, Divesh and Dadush, Daniel and Regev, Oded and Stephens-Davidowitz, Noah},
|
||
title = {{Solving the Shortest Vector Problem in $2^n$ Time Using Discrete Gaussian Sampling}},
|
||
booktitle = {STOC},
|
||
year = {2015},
|
||
pages = {733--742},
|
||
publisher = {ACM},
|
||
doi = {10.1145/2746539.2746606},
|
||
isbn = {978-1-4503-3536-2},
|
||
keywords = {discrete Gaussian, lattices, shortest vector problem},
|
||
url = {http://doi.acm.org/10.1145/2746539.2746606},
|
||
}
|
||
|
||
@InProceedings{Jou00,
|
||
author = {Joux, Antoine},
|
||
title = {A One Round Protocol for Tripartite Diffie--Hellman},
|
||
booktitle = {Algorithmic Number Theory},
|
||
year = {2000},
|
||
editor = {Bosma, Wieb},
|
||
pages = {385--393},
|
||
publisher = {Springer},
|
||
isbn = {978-3-540-44994-2},
|
||
}
|
||
|
||
@InProceedings{BF01,
|
||
author = {Boneh, Dan and Franklin, Matt},
|
||
title = {Identity-Based Encryption from the Weil Pairing},
|
||
booktitle = {Crypto},
|
||
year = {2001},
|
||
editor = {Kilian, Joe},
|
||
pages = {213--229},
|
||
publisher = {Springer},
|
||
isbn = {978-3-540-44647-7},
|
||
}
|
||
|
||
@InProceedings{Wat05,
|
||
author = {Waters, Brent},
|
||
title = {Efficient Identity-Based Encryption Without Random Oracles},
|
||
booktitle = {Eurocrypt},
|
||
year = {2005},
|
||
editor = {Cramer, Ronald},
|
||
pages = {114--127},
|
||
publisher = {Springer},
|
||
isbn = {978-3-540-32055-5},
|
||
}
|
||
|
||
@InProceedings{KSS08,
|
||
author = {Kachisa, Ezekiel J. and Schaefer, Edward F. and Scott, Michael},
|
||
title = {Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field},
|
||
booktitle = {Pairing-Based Cryptography -- Pairing},
|
||
year = {2008},
|
||
editor = {Galbraith, Steven D. and Paterson, Kenneth G.},
|
||
pages = {126--135},
|
||
publisher = {Springer},
|
||
isbn = {978-3-540-85538-5},
|
||
}
|
||
|
||
@InProceedings{BN06,
|
||
author = {Barreto, Paulo S. L. M. and Naehrig, Michael},
|
||
title = {Pairing-Friendly Elliptic Curves of Prime Order},
|
||
booktitle = {Selected Areas in Cryptography},
|
||
year = {2006},
|
||
editor = {Preneel, Bart and Tavares, Stafford},
|
||
pages = {319--331},
|
||
publisher = {Springer},
|
||
isbn = {978-3-540-33109-4},
|
||
}
|
||
|
||
@Article{BD18,
|
||
author = {Barbulescu, Razvan and Duquesne, Sylvain},
|
||
title = {{Updating Key Size Estimations for Pairings}},
|
||
journal = {Journal of Cryptology},
|
||
year = {2018},
|
||
pages = {1--39},
|
||
day = {29},
|
||
doi = {10.1007/s00145-018-9280-5},
|
||
url = {https://doi.org/10.1007/s00145-018-9280-5},
|
||
}
|
||
|
||
@InProceedings{KB16,
|
||
author = {Kim, Taechan and Barbulescu, Razvan},
|
||
title = {Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case},
|
||
booktitle = {Crypto},
|
||
year = {2016},
|
||
editor = {Robshaw, Matthew and Katz, Jonathan},
|
||
pages = {543--571},
|
||
publisher = {Springer},
|
||
isbn = {978-3-662-53018-4},
|
||
}
|
||
|
||
@Misc{BGdMM05,
|
||
author = {Lucas Ballard and Matthew Green and Breno de Medeiros and Fabian Monrose},
|
||
title = {Correlation-Resistant Storage via Keyword-Searchable Encryption},
|
||
howpublished = {Cryptology ePrint Archive, Report 2005/417},
|
||
year = {2005},
|
||
note = {\url{https://eprint.iacr.org/2005/417}},
|
||
}
|
||
|
||
@Article{KL11,
|
||
author = {Kidron, Dafna and Lindell, Yehuda},
|
||
title = {Impossibility Results for Universal Composability in<69>Public-Key Models and with Fixed Inputs},
|
||
journal = {Journal of Cryptology},
|
||
year = {2011},
|
||
volume = {24},
|
||
number = {3},
|
||
pages = {517--544},
|
||
issn = {1432-1378},
|
||
day = {01},
|
||
doi = {10.1007/s00145-010-9069-7},
|
||
url = {https://doi.org/10.1007/s00145-010-9069-7},
|
||
}
|
||
|
||
@InProceedings{CKL03,
|
||
author = {Canetti, Ran and Kushilevitz, Eyal and Lindell, Yehuda},
|
||
title = {On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions},
|
||
booktitle = {Eurocrypt},
|
||
year = {2003},
|
||
editor = {Biham, Eli},
|
||
pages = {68--86},
|
||
publisher = {Springer},
|
||
isbn = {978-3-540-39200-2},
|
||
}
|
||
|
||
@Article{CKL06,
|
||
author = {Canetti, Ran and Kushilevitz, Eyal and Lindell, Yehuda},
|
||
title = {On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions},
|
||
journal = {Journal of Cryptology},
|
||
year = {2006},
|
||
volume = {19},
|
||
number = {2},
|
||
pages = {135--167},
|
||
issn = {1432-1378},
|
||
day = {01},
|
||
doi = {10.1007/s00145-005-0419-9},
|
||
url = {https://doi.org/10.1007/s00145-005-0419-9},
|
||
}
|
||
|
||
@InProceedings{Yao86,
|
||
author = {Yao, Andrew Chi-Chih},
|
||
title = {How to generate and exchange secrets},
|
||
booktitle = {FOCS},
|
||
year = {1986},
|
||
}
|
||
|
||
@InProceedings{LP07,
|
||
author = {Lindell, Yehuda and Pinkas, Benny},
|
||
title = {An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries},
|
||
booktitle = {Eurocrypt},
|
||
year = {2007},
|
||
editor = {Naor, Moni},
|
||
pages = {52--78},
|
||
publisher = {Springer},
|
||
isbn = {978-3-540-72540-4},
|
||
}
|
||
|
||
@InProceedings{Coo71,
|
||
author = {Cook, Stephen A.},
|
||
title = {The Complexity of Theorem-proving Procedures},
|
||
booktitle = {Proceedings of the Third Annual ACM Symposium on Theory of Computing},
|
||
year = {1971},
|
||
series = {STOC '71},
|
||
pages = {151--158},
|
||
publisher = {ACM},
|
||
doi = {10.1145/800157.805047},
|
||
url = {http://doi.acm.org/10.1145/800157.805047},
|
||
}
|
||
|
||
@InProceedings{MSS17,
|
||
author = {Menezes, Alfred and Sarkar, Palash and Singh, Shashank},
|
||
title = {{Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-Based Cryptography}},
|
||
booktitle = {Paradigms in Cryptology -- Mycrypt. Malicious and Exploratory Cryptology},
|
||
year = {2017},
|
||
editor = {Phan, Rapha{\"e}l C.-W. and Yung, Moti},
|
||
pages = {83--108},
|
||
publisher = {Springer},
|
||
isbn = {978-3-319-61273-7},
|
||
}
|
||
|
||
@Article{Gil77,
|
||
author = {John Gill},
|
||
title = {{Computational Complexity of Probabilistic Turing Machines}},
|
||
journal = {SIAM J. on Computing},
|
||
year = {1977},
|
||
volume = {6},
|
||
number = {4},
|
||
pages = {675--695},
|
||
doi = {10.1137/0206049},
|
||
eprint = {https://doi.org/10.1137/0206049},
|
||
url = {
|
||
https://doi.org/10.1137/0206049
|
||
|
||
},
|
||
}
|
||
|
||
@Misc{Rab60,
|
||
author = {Rabin, Michael Oser},
|
||
title = {Degree of difficulty of computing a function and a partial ordering of recursive sets},
|
||
howpublished = {Technical Report 2, {Hebrew University of Jerusalem}},
|
||
year = {1960},
|
||
publisher = {Hebrew University},
|
||
}
|
||
|
||
@Book{AB09,
|
||
title = {Computational Complexity: A Modern Approach},
|
||
publisher = {Cambridge University Press},
|
||
year = {2009},
|
||
author = {Arora, Sanjeev and Barak, Boaz},
|
||
edition = {1st},
|
||
isbn = {0521424267, 9780521424264},
|
||
}
|
||
|
||
@Book{KL07,
|
||
title = {Introduction to Modern Cryptography (Chapman \& Hall/Crc Cryptography and Network Security Series)},
|
||
publisher = {Chapman \& Hall/CRC},
|
||
year = {2007},
|
||
author = {Katz, Jonathan and Lindell, Yehuda},
|
||
isbn = {1584885513},
|
||
}
|
||
|
||
@InProceedings{BR93,
|
||
author = {Bellare, Mihir and Rogaway, Phillip},
|
||
title = {Random Oracles Are Practical: A Paradigm for Designing Efficient Protocols},
|
||
booktitle = {CCS},
|
||
year = {1993},
|
||
publisher = {ACM},
|
||
doi = {10.1145/168588.168596},
|
||
isbn = {0-89791-629-8},
|
||
url = {http://doi.acm.org/10.1145/168588.168596},
|
||
}
|
||
|
||
@Article{CGH04,
|
||
author = {Canetti, Ran and Goldreich, Oded and Halevi, Shai},
|
||
title = {The Random Oracle Methodology, Revisited},
|
||
journal = {J. of ACM},
|
||
year = {2004},
|
||
volume = {51},
|
||
number = {4},
|
||
pages = {557--594},
|
||
issn = {0004-5411},
|
||
doi = {10.1145/1008731.1008734},
|
||
issue_date = {July 2004},
|
||
keywords = {CS-proofs, Correlation intractability, cryptography, diagonalization, the random-oracle model},
|
||
publisher = {ACM},
|
||
url = {http://doi.acm.org/10.1145/1008731.1008734},
|
||
}
|
||
|
||
@InProceedings{LLM+17,
|
||
author = {Libert, Beno{\^i}t and Ling, San and Mouhartem, Fabrice and Nguyen, Khoa and Wang, Huaxiong},
|
||
title = {Adaptive Oblivious Transfer with Access Control from Lattice Assumptions},
|
||
booktitle = {Asiacrypt},
|
||
year = {2017},
|
||
editor = {Takagi, Tsuyoshi and Peyrin, Thomas},
|
||
pages = {533--563},
|
||
publisher = {Springer},
|
||
isbn = {978-3-319-70694-8},
|
||
}
|
||
|
||
@InProceedings{LMPY16,
|
||
author = {Libert, Beno\^{\i}t and Mouhartem, Fabrice and Peters, Thomas and Yung, Moti},
|
||
title = {Practical "Signatures with Efficient Protocols" from Simple Assumptions},
|
||
booktitle = {AsiaCCS},
|
||
year = {2016},
|
||
pages = {511--522},
|
||
publisher = {ACM},
|
||
doi = {10.1145/2897845.2897898},
|
||
isbn = {978-1-4503-4233-9},
|
||
keywords = {anonymous credentials, efficient privacy-enhancing protocols, group signatures, privacy, signature, signature with efficient protocols, simple cryptographic assumptions},
|
||
url = {http://doi.acm.org/10.1145/2897845.2897898},
|
||
}
|
||
|
||
@Article{GM84,
|
||
author = {Shafi Goldwasser and Silvio Micali},
|
||
title = {Probabilistic encryption},
|
||
journal = {J. of Computer and System Sciences},
|
||
year = {1984},
|
||
volume = {28},
|
||
number = {2},
|
||
pages = {270--299},
|
||
issn = {0022-0000},
|
||
doi = {https://doi.org/10.1016/0022-0000(84)90070-9},
|
||
url = {http://www.sciencedirect.com/science/article/pii/0022000084900709},
|
||
}
|
||
|
||
@Book{Gol04,
|
||
title = {Foundations of Cryptography: Volume 2, Basic Applications},
|
||
publisher = {Cambridge University Press},
|
||
year = {2004},
|
||
author = {Goldreich, Oded},
|
||
isbn = {0521830842},
|
||
}
|
||
|
||
@InProceedings{CF01,
|
||
author = {Canetti, Ran and Fischlin, Marc},
|
||
title = {Universally Composable Commitments},
|
||
booktitle = {Crypto},
|
||
year = {2001},
|
||
pages = {19--40},
|
||
publisher = {Springer},
|
||
isbn = {978-3-540-44647-7},
|
||
}
|
||
|
||
@InProceedings{ADS15,
|
||
author = {Aggarwal, Divesh and Dadush, Daniel and Stephens-Davidowitz, Noah},
|
||
title = {{Solving the Closest Vector Problem in $2^n$ Time --- The Discrete Gaussian Strikes Again!}},
|
||
booktitle = {FOCS},
|
||
publisher = {ACM},
|
||
year = {2015},
|
||
url = {https://arxiv.org/abs/1504.01995},
|
||
}
|
||
|
||
@InProceedings{AFG14,
|
||
author = {Albrecht, Martin R. and Fitzpatrick, Robert and G{\"o}pfert, Florian},
|
||
title = {{On the Efficacy of Solving LWE by Reduction to Unique-SVP}},
|
||
booktitle = {ICISC 2013},
|
||
year = {2014},
|
||
pages = {293--310},
|
||
address = {Cham},
|
||
publisher = {Springer},
|
||
}
|
||
|
||
@InProceedings{Blu86,
|
||
author = {Blum, Manuel},
|
||
title = {How to prove a theorem so no one else can claim it},
|
||
booktitle = {International Congress of Mathematicians},
|
||
year = {1986},
|
||
pages = {1444--1451},
|
||
}
|
||
|
||
@Unpublished{Dam10,
|
||
author = {Damg{\aa}rd, Ivan},
|
||
title = {On {$\Sigma$}-protocols},
|
||
note = {Lecture Notes. \url{http://www.daimi.au.dk/~ivan/Sigma.pdf}},
|
||
month = mar,
|
||
year = {2010},
|
||
url = {http://www.daimi.au.dk/%7Eivan/Sigma.pdf},
|
||
}
|
||
|
||
@InProceedings{Blu81,
|
||
author = {Blum, Manuel},
|
||
title = {{Coin Flipping by Telephone}},
|
||
booktitle = {Crypto},
|
||
year = {1981},
|
||
editor = {Springer},
|
||
pages = {11--15},
|
||
}
|
||
|
||
@InProceedings{GOS06,
|
||
author = {Groth, Jens and Ostrovsky, Rafail and Sahai, Amit},
|
||
title = {{Perfect Non-interactive Zero Knowledge for NP}},
|
||
booktitle = {Eurocrypt},
|
||
year = {2006},
|
||
}
|
||
|
||
@Unpublished{Sho06,
|
||
author = {Shoup, Victor},
|
||
title = {{Sequences of Games: A Tool for Taming Complexity in Security Proofs}},
|
||
note = {Tutorial. \url{http://www.shoup.net/papers/games.pdf}},
|
||
month = jan,
|
||
year = {2006},
|
||
}
|
||
|
||
@InProceedings{Ped91,
|
||
author = {Pedersen, Torben Pryds},
|
||
title = {{Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing}},
|
||
booktitle = {Crypto},
|
||
year = {1991},
|
||
editor = {Springer},
|
||
pages = {129--140},
|
||
}
|
||
|
||
@InProceedings{Lyu09,
|
||
author = {Lyubashevsky, Vadim},
|
||
title = {{Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures}},
|
||
booktitle = {Asiacrypt},
|
||
year = {2009},
|
||
editor = {Springer},
|
||
pages = {598--616},
|
||
}
|
||
|
||
@InProceedings{dPLNS17,
|
||
author = {del Pino, Rafa<66>l and Lyubashevsky, Vadim and Neven, Gregory and Seiler, Gregory},
|
||
title = {{Practical Quantum-Safe Voting from Lattices}},
|
||
booktitle = {CCS},
|
||
year = {2017},
|
||
}
|
||
|
||
@InProceedings{LLNW17,
|
||
author = {Libert, Beno<6E>t and Ling, San and Nguyen, Khoa and Wang, Huaxiong},
|
||
title = {{Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash}},
|
||
booktitle = {Asiacrypt},
|
||
year = {2017},
|
||
editor = {Springer},
|
||
series = {LNCS},
|
||
pages = {304--335},
|
||
}
|
||
|
||
@InProceedings{Ajt96,
|
||
author = {Ajtai, Mikl<6B>s},
|
||
title = {{Generating Hard Instances of Lattice Problems}},
|
||
booktitle = {STOC},
|
||
year = {1996},
|
||
editor = {ACM},
|
||
pages = {99--108},
|
||
}
|
||
|
||
@InProceedings{FS90,
|
||
author = {Feige, Uriel and Shamir, Adi},
|
||
title = {{Witness Indistinguishable and Witness Hiding Protocols}},
|
||
booktitle = {STOC},
|
||
year = {1990},
|
||
editor = {ACM},
|
||
pages = {416--426},
|
||
}
|
||
|
||
@Comment{jabref-meta: databaseType:bibtex;}
|