-
1Academic Journal
المؤلفون: Albrecht, Martin R., Farshim, Pooya, Han, Shuai, Hofheinz, Dennis, Larraia, Enrique, Paterson, Kenneth G.
المصدر: Journal of cryptology, 33, 1080–1113 ; ISSN: 0933-2790, 1432-1378
مصطلحات موضوعية: Multilinear map, Indistinguishability obfuscation, Homomorphic encryption, Decisional Diffie–Hellman, Groth–Sahai proofs, ddc:004, DATA processing & computer science, info:eu-repo/classification/ddc/004
وصف الملف: application/pdf
Relation: info:eu-repo/semantics/altIdentifier/wos/000505364400001; info:eu-repo/semantics/altIdentifier/issn/0933-2790; info:eu-repo/semantics/altIdentifier/issn/1432-1378; https://publikationen.bibliothek.kit.edu/1000105369; https://publikationen.bibliothek.kit.edu/1000105369/59599431; https://doi.org/10.5445/IR/1000105369
-
2Conference
المؤلفون: Herold, Gottfried, Hoffmann, Max, Klooß, Michael, Ràfols, Carla, Rupp, Andy
مصطلحات موضوعية: Batch verification, Bilinear maps, Groth-Sahai proofs, Structure-preserving cryptography, Belenios, P-signatures
وصف الملف: application/pdf
Relation: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security; 2017 Oct 30 - Nov 3; Dallas, Texas, USA. New York: ACM; 2017. p. 1547-64.; info:eu-repo/grantAgreement/EC/FP7/335086; info:eu-repo/grantAgreement/EC/FP7/600387; http://hdl.handle.net/10230/43208; http://dx.doi.org/10.1145/3133956.3134068
-
3Conference
المؤلفون: Albrecht, Martin R., Farshim, Pooya, Hofheinz, Dennis, Larraia, Enrique, Paterson, Kenneth G.
المساهمون: Royal Holloway University of London (RHUL), École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL), Karlsruher Institut für Technologie (KIT)
المصدر: Thirteenth IACR Theory of Cryptography Conference - TCC 2016-A ; https://hal-ens.archives-ouvertes.fr/hal-01470888 ; Thirteenth IACR Theory of Cryptography Conference - TCC 2016-A, Jan 2016, Tel Aviv, Israel. pp.446 - 473, ⟨10.1007/978-3-662-49096-9_19⟩
مصطلحات موضوعية: Multilinear map, indistinguishability obfuscation, homomorphic encryption, decisional Diffie–Hellman, Groth–Sahai proofs, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Relation: hal-01470888; https://hal-ens.archives-ouvertes.fr/hal-01470888; https://hal-ens.archives-ouvertes.fr/hal-01470888/document; https://hal-ens.archives-ouvertes.fr/hal-01470888/file/main.pdf
-
4Academic Journal
المؤلفون: Escala Ribas, Alex, Herold, Gottfried, Kiltz, Eike, Ràfols Salvador, Carla, Villar Santos, Jorge Luis
المساهمون: Universitat Politècnica de Catalunya. Departament de Matemàtiques, Universitat Politècnica de Catalunya. MAK - Matemàtica Aplicada a la Criptografia
مصطلحات موضوعية: Àrees temàtiques de la UPC::Matemàtiques i estadística::Investigació operativa::Programació matemàtica, Àrees temàtiques de la UPC::Matemàtiques i estadística::Àlgebra::Teoria de nombres, Combinatorial analysis, Probabilities, Di e-Hellman Assumption, Generic Hardness, Groth-Sahai proofs, Hash Proof Systems, Public-key Encryption, Combinacions (Matemàtica), Probabilitats, Classificació AMS::05 Combinatorics::05E Algebraic combinatorics, Classificació AMS::11 Number theory::11K Probabilistic theory: distribution modulo $1$, metric theory of algorithms
وصف الملف: 47 p.
Relation: http://link.springer.com/article/10.1007/s00145-015-9220-6; Escala, A., Herold, G., Kiltz, E., Rafols, C., Villar, J. An algebraic framework for Diffie-Hellman assumptions. "Journal of cryptology", Gener 2017, vol. 30, núm. 1, p. 242-288.; http://hdl.handle.net/2117/113812
-
5Conference
المؤلفون: Ràfols, Carla
مصطلحات موضوعية: Zero-knowledge, Groth-Sahai proofs, Distributed cryptography, Simulation soundness
وصف الملف: application/pdf
Relation: Dodis Y, Nielsen JB, editors. Theory of cryptography. 12th Theory of Cryptography Conference TCC 2015 Proceedings, Part II; Warsaw, Poland, 2015 Mar 23-25. Berlin: Springer; 2015. p. 247-76. (LNCS; 9015).; http://hdl.handle.net/10230/42227
-
6Academic Journal
المؤلفون: Fumitaka HOSHINO, Masayuki ABE, Miyako OHKUBO
المصدر: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2019, E102.A(1):251
-
7Conference
المؤلفون: Herold, Gottfried, Hesse, Julia, Hofheinz, Dennis, Ràfols, Carla, Rupp, Andy
مصطلحات موضوعية: Bilinear maps, Composite-order groups, Groth-Sahai proofs
وصف الملف: application/pdf
Relation: Garay JA, Gennaro R, editors. Advances in Cryptology – CRYPTO 2014. 34th Annual Cryptology Conference Proceedings, Part I; 2014 Aug 17-21; Santa Barbara, CA, USA. Berlin: Springer; 2014. p. 261-79. (LNCS; no. 8616).; http://hdl.handle.net/10230/42229
-
8
المؤلفون: Shuai Han, Pooya Farshim, Dennis Hofheinz, Enrique Larraia, Martin R. Albrecht, Kenneth G. Paterson
المصدر: Journal of cryptology, 33, 1080–1113
Journal of Cryptology, 33مصطلحات موضوعية: Polynomial (hyperelastic model), Indistinguishability obfuscation, Multilinear map, Homomorphic encryption, Decisional Diffie–Hellman, Groth–Sahai proofs, Group (mathematics), Applied Mathematics, DATA processing & computer science, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences, Computer Science Applications, Combinatorics, Base (group theory), 010201 computation theory & mathematics, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, ddc:004, Software, Mathematics
وصف الملف: application/pdf; application/application/pdf
-
9
المؤلفون: Rafael Dowsley, Masayuki Abe, Jan Camenisch, Maria Dubovitskaya
المصدر: Abe, M, Camenisch, J, Dowsley, R & Dubovitskaya, M 2019, ' On the Impossibility of Structure-Preserving Deterministic Primitives ', Journal of Cryptology, vol. 32, no. 1, pp. 239-264 . https://doi.org/10.1007/s00145-018-9292-1
مصطلحات موضوعية: Theoretical computer science, Computer science, Verifiable random functions, Structure (category theory), Unique signatures, 0102 computer and information sciences, Encryption, Mathematical proof, 01 natural sciences, 03 medical and health sciences, 0302 clinical medicine, Structure-preserving cryptography, Protocol (object-oriented programming), Computer Science::Cryptography and Security, business.industry, Applied Mathematics, Cryptographic protocol, Modular design, Computer Science Applications, 010201 computation theory & mathematics, Discrete logarithm, Groth–Sahai proofs, 030220 oncology & carcinogenesis, Verifiable secret sharing, business, Software
-
10Academic Journal
المؤلفون: Àlex Escala, Javier Herranz, Paz Morillo
المساهمون: The Pennsylvania State University CiteSeerX Archives
المصدر: http://eprint.iacr.org/2011/052.pdf.
مصطلحات موضوعية: attribute-based signatures, Groth-Sahai proofs, unforgeability, non-linkability
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.294.2388; http://eprint.iacr.org/2011/052.pdf
-
11Report
المساهمون: Krawczyk, H
المصدر: In: Krawczyk, H, (ed.) Public-Key Cryptography – PKC 2014. 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings. (pp. pp. 630-649). Springer Berlin Heidelberg (2014)
مصطلحات موضوعية: Non-interactive zero-knowledge proofs, commit-and-prove schemes, Groth-Sahai proofs, type-based commitments
وصف الملف: application/pdf
Relation: https://discovery.ucl.ac.uk/id/eprint/1431075/2/EscalaGroth14FineTuning.pdf; https://discovery.ucl.ac.uk/id/eprint/1431075/
-
12Academic Journal
المؤلفون: Eiichiro FUJISAKI
المصدر: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2012, E95.A(1):151
-
13
المؤلفون: Gottfried Herold, Carla Ràfols, Andy Rupp, Michael Klooß, Max Hoffmann
المساهمون: Arithmetic and Computing (ARIC), Inria Grenoble - Rhône-Alpes, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire de l'Informatique du Parallélisme (LIP), Centre National de la Recherche Scientifique (CNRS)-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École normale supérieure - Lyon (ENS Lyon)-Centre National de la Recherche Scientifique (CNRS)-Université de Lyon-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École normale supérieure - Lyon (ENS Lyon), École normale supérieure - Lyon (ENS Lyon), Ruhr-Universität Bochum [Bochum], Karlsruher Institut für Technologie (KIT), Universitat Pompeu Fabra [Barcelona] (UPF), École normale supérieure de Lyon (ENS de Lyon)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure de Lyon (ENS de Lyon)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Université de Lyon-Centre National de la Recherche Scientifique (CNRS), École normale supérieure de Lyon (ENS de Lyon), École normale supérieure - Lyon (ENS Lyon)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure - Lyon (ENS Lyon)-Université Claude Bernard Lyon 1 (UCBL)
المصدر: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, Dallas, United States
CCS
Recercat. Dipósit de la Recerca de Catalunya
instnameمصطلحات موضوعية: Theoretical computer science, Computer science, Groth-Sahai proofs, Bilinear interpolation, 0102 computer and information sciences, 02 engineering and technology, Mathematical proof, System of linear equations, Batch verification, 01 natural sciences, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], 0202 electrical engineering, electronic engineering, information engineering, Structure-preserving cryptography, [INFO]Computer Science [cs], Algebraic number, P-signatures, ComputingMilieux_MISCELLANEOUS, Polynomial identity testing, Belenios, Runtime verification, Probabilistic logic, Cryptographic protocol, 010201 computation theory & mathematics, Bilinear maps, Pairing, 020201 artificial intelligence & image processing, Bilinear map, Algorithm
وصف الملف: application/pdf
-
14
المساهمون: Royal Holloway [University of London] (RHUL), École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL), Karlsruher Institut für Technologie (KIT)
المصدر: Thirteenth IACR Theory of Cryptography Conference-TCC 2016-A
Thirteenth IACR Theory of Cryptography Conference-TCC 2016-A, Jan 2016, Tel Aviv, Israel. pp.446-473, ⟨10.1007/978-3-662-49096-9_19⟩
Theory of Cryptography ISBN: 9783662490952
TCC (A1)مصطلحات موضوعية: Polynomial (hyperelastic model), Discrete mathematics, Multilinear map, Group (mathematics), decisional Diffie–Hellman, homomorphic encryption, indistinguishability obfuscation, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences, Linear map, Combinatorics, Base (group theory), [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], 010201 computation theory & mathematics, Groth–Sahai proofs, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Mathematics
-
15Conference
المؤلفون: Blazy, Olivier, Canard, Sébastien, Fuchsbauer, Georg, Gouget, Aline, Sibert, Hervé, Traoré, Jacques
المساهمون: Construction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities (CASCADE), Département d'informatique de l'École normale supérieure (DI-ENS), École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Inria Paris-Rocquencourt, Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS), Orange Labs Caen, Orange Labs, Department of Computer Science Bristol, University of Bristol Bristol, GemAlto Research Labs, GEMALTO (GEMALTO), ST-Ericsson Le Mans, Abderrahmane Nitaj, David Pointcheval
المصدر: AFRICACRYPT 2011 - 4th International Conference on Cryptology in Africa ; https://hal.inria.fr/hal-01110485 ; AFRICACRYPT 2011 - 4th International Conference on Cryptology in Africa, Jul 2011, Dakar, Senegal. pp.206-223, ⟨10.1007/978-3-642-21969-6_13⟩
مصطلحات موضوعية: commuting signatures, anonymity, Groth-Sahai proofs, Transferable e-cash, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Relation: hal-01110485; https://hal.inria.fr/hal-01110485
-
16
المؤلفون: Andy Rupp, Gottfried Herold, Dennis Hofheinz, Carla Ràfols, Julia Hesse
المصدر: Recercat. Dipósit de la Recerca de Catalunya
instname
Advances in Cryptology – CRYPTO 2014 ISBN: 9783662443705
CRYPTO (1)مصطلحات موضوعية: Algebra, Polynomial, Transformation (function), Computer science, Bilinear maps, Composite number, Cryptosystem, Composite-order groups, Groth-Sahai proofs, Point (geometry), Order of magnitude, Prime (order theory)
وصف الملف: application/pdf
-
17
المؤلفون: Gottfried Herold, Jorge L. Villar, Alex Escala, Carla Ràfols, Eike Kiltz
المساهمون: Universitat Politècnica de Catalunya. Departament de Matemàtiques, Universitat Politècnica de Catalunya. MAK - Matemàtica Aplicada a la Criptografia
المصدر: UPCommons. Portal del coneixement obert de la UPC
Universitat Politècnica de Catalunya (UPC)
Recercat. Dipósit de la Recerca de Catalunya
instname
Advances in Cryptology – CRYPTO 2013 ISBN: 9783642400834
CRYPTO (2)مصطلحات موضوعية: Algebraic properties, Combinatorial analysis, Matemàtiques i estadística::Investigació operativa::Programació matemàtica [Àrees temàtiques de la UPC], metric theory of algorithms, Groth-Sahai proofs, Di e-Hellman Assumption, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences, Combinatorics, Diffie–Hellman key exchange, Matrix (mathematics), Hash proof systems, Number theory, 11 Number theory::11Y Computational number theory [Classificació AMS], 0202 electrical engineering, electronic engineering, information engineering, Diffie-Hellman assumption, Algebraic number, Matemàtiques i estadística::Àlgebra::Teoria de nombres [Àrees temàtiques de la UPC], Mathematics, Discrete mathematics, Probabilities, Public-key encryption, 11 Number theory::11K Probabilistic theory: distribution modulo $1$ [Classificació AMS], 11 Number theory::11K Probabilistic theory: distribution modulo $1$, metric theory of algorithms [Classificació AMS], Applied Mathematics, Nombres, Teoria dels, Diffie-Hellman Assumption, Computer Science Applications, Public-key Encryption, Generic Hardness, Distribution (mathematics), Combinacions (Matemàtica), 010201 computation theory & mathematics, Irreducibility, Probabilitats, 020201 artificial intelligence & image processing, Hash Proof Systems, Linear independence, 05 Combinatorics::05E Algebraic combinatorics [Classificació AMS], Software, Generic hardness
وصف الملف: application/pdf
-
18
المؤلفون: Hervé Sibert, Jacques Traore, Aline Gouget, Georg Fuchsbauer, Olivier Blazy, Sébastien Canard
المساهمون: Construction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities (CASCADE), Département d'informatique - ENS Paris (DI-ENS), École normale supérieure - Paris (ENS-PSL), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure - Paris (ENS-PSL), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Inria Paris-Rocquencourt, Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS), Orange Labs [Caen], Orange Labs, Department of Computer Science [Bristol], University of Bristol [Bristol], GemAlto Research Labs, GEMALTO (GEMALTO), ST-Ericsson [Le Mans], Abderrahmane Nitaj, David Pointcheval, Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Inria Paris-Rocquencourt, Département d'informatique de l'École normale supérieure (DI-ENS), École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure - Paris (ENS Paris)
المصدر: AFRICACRYPT 2011-4th International Conference on Cryptology in Africa
AFRICACRYPT 2011-4th International Conference on Cryptology in Africa, Jul 2011, Dakar, Senegal. pp.206-223, ⟨10.1007/978-3-642-21969-6_13⟩
Lecture Notes in Computer Science ISBN: 9783642219689
AFRICACRYPTمصطلحات موضوعية: Scheme (programming language), Property (philosophy), Computer science, Transferable e-cash, media_common.quotation_subject, Electronic cash, Internet privacy, Groth-Sahai proofs, Context (language use), 0102 computer and information sciences, 02 engineering and technology, Computer security, computer.software_genre, 01 natural sciences, commuting signatures, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], 0202 electrical engineering, electronic engineering, information engineering, media_common, computer.programming_language, Cryptographic primitive, anonymity, business.industry, 010201 computation theory & mathematics, Cash, 020201 artificial intelligence & image processing, business, computer, Database transaction, Anonymity
-
19Academic Journal
المؤلفون: Alex Escala, Jens Groth
المساهمون: The Pennsylvania State University CiteSeerX Archives
المصدر: https://eprint.iacr.org/2013/662.pdf.
مصطلحات موضوعية: Non-interactive zero-knowledge proofs, commit-and-prove schemes, Groth-Sahai proofs, type-based commitments
وصف الملف: application/pdf
-
20Academic Journal
المساهمون: The Pennsylvania State University CiteSeerX Archives
المصدر: http://eprint.iacr.org/2015/050.pdf.
مصطلحات موضوعية: Zero-knowledge, Groth-Sahai proofs, distributed cryptography, simulation sound
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.692.3333; http://eprint.iacr.org/2015/050.pdf