


default search action
ASIACRYPT 2015: Auckland, New Zealand
- Tetsu Iwata, Jung Hee Cheon:

Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9452, Springer 2015, ISBN 978-3-662-48796-9
Best Paper
- Shi Bai, Adeline Langlois

, Tancrède Lepoint
, Damien Stehlé, Ron Steinfeld:
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather Than the Statistical Distance. 3-24
Indistinguishability Obfuscation
- Saikrishna Badrinarayanan, Divya Gupta, Abhishek Jain, Amit Sahai:

Multi-input Functional Encryption for Unbounded Arity Functions. 27-51 - Dakshita Khurana, Vanishree Rao, Amit Sahai:

Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation. 52-75
PRFs and Hashes
- Susan Hohenberger, Venkata Koppula, Brent Waters:

Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model. 79-102 - Michel Abdalla

, Fabrice Benhamouda
, Alain Passelègue:
Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security. 103-120 - Tatsuaki Okamoto, Krzysztof Pietrzak, Brent Waters, Daniel Wichs:

New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators. 121-145
Discrete Logarithms and Number Theory
- Aurore Guillevic

:
Computing Individual Discrete Logarithms Faster in GF(p n ) with the NFS-DL Algorithm. 149-173 - Taechan Kim

:
Multiple Discrete Logarithm Problems with Auxiliary Inputs. 174-188 - Yao Lu, Rui Zhang, Liqiang Peng, Dongdai Lin:

Solving Linear Equations Modulo Unknown Divisors: Revisited. 189-213 - Craig Costello

, Patrick Longa:
Fourℚ: Four-Dimensional Decompositions on a ℚ-curve over the Mersenne Prime. 214-235
Signatures
- Jens Groth

:
Efficient Fully Structure-Preserving Signatures for Large Messages. 239-259 - Martianus Frederic Ezerman

, Hyung Tae Lee, San Ling
, Khoa Nguyen
, Huaxiong Wang:
A Provably Secure Group Signature Scheme from Code-Based Assumptions. 260-285 - Sanjit Chatterjee, Alfred Menezes:

Type 2 Structure-Preserving Signature Schemes Revisited. 286-310 - Albrecht Petzoldt, Ming-Shing Chen, Bo-Yin Yang, Chengdong Tao, Jintai Ding

:
Design Principles for HFEv- Based Multivariate Signature Schemes. 311-334
Multiparty Computation I
- Dana Dachman-Soled, Chang Liu, Charalampos Papamanthou, Elaine Shi, Uzi Vishkin:

Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness. 337-359 - Sky Faber, Stanislaw Jarecki, Sotirios Kentros, Boyang Wei:

Three-Party ORAM for Secure Computation. 360-385 - Vladimir Kolesnikov, Ranjit Kumaresan:

On Cut-and-Choose Oblivious Transfer and Its Variants. 386-412
Public Key Encryption
- Takahiro Matsuda

, Goichiro Hanaoka
:
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption. 415-442 - Carmit Hazay

, Arpita Patra, Bogdan Warinschi:
Selective Opening Security for Receivers. 443-469 - Allison Bishop, Abhishek Jain, Lucas Kowalczyk:

Function-Hiding Inner Product Encryption. 470-491
ABE and IBE
- Dennis Hofheinz, Christian Matt

, Ueli Maurer:
Idealizing Identity-Based Encryption. 495-520 - Nuttapong Attrapadung

, Goichiro Hanaoka
, Shota Yamada
:
A Framework for Identity-Based Encryption with Almost Tight Security. 521-549 - Sergey Gorbunov, Dhinakaran Vinayagamurthy:

Riding on Asymmetry: Efficient ABE for Branching Programs. 550-574 - Nuttapong Attrapadung

, Goichiro Hanaoka
, Shota Yamada
:
Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs. 575-601
Zero-Knowledge
- Alonso González, Alejandro Hevia, Carla Ràfols

:
QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions. 605-629 - Charanjit S. Jutla, Arnab Roy:

Dual-System Simulation-Soundness with Applications to UC-PAKE and More. 630-655 - Vinod Vaikuntanathan, Prashant Nalini Vasudevan:

Secret Sharing and Statistical Zero Knowledge. 656-680 - Benoît Libert, Thomas Peters, Marc Joye, Moti Yung:

Compactly Hiding Linear Spans - Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications. 681-707
Multiparty Computation II
- Tore Kasper Frederiksen, Marcel Keller

, Emmanuela Orsini
, Peter Scholl
:
A Unified Approach to MPC with Preprocessing Using OT. 711-735 - Abhi Shelat, Muthuramakrishnan Venkitasubramaniam:

Secure Computation from Millionaire. 736-757 - Carmen Kempka, Ryo Kikuchi, Susumu Kiyoshima, Koutarou Suzuki:

Garbling Scheme for Formulas with Constant Size of Garbled Gates. 758-782 - Alexander Koch

, Stefan Walzer
, Kevin Härtel:
Card-Based Cryptographic Protocols Using a Minimal Number of Cards. 783-807

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














