Smooth projective hashing was firstly introduced by Cramer and Shoup (EuroCrypt\u2702) as a tool to construct efficient chosen-ciphertext-secure public key encryption schemes. Since then, they have found many other applications, such as password-based authenticated key exchange, oblivious transfer, zero-knowledge arguments et al. Certificate-based encryption (CBE) not only eliminates third-party queries and heavy certificate management problem in traditional public-key encryption, but also solves key escrow problem for identity-based encryption. We introduce the new concept of certificate-based smooth projective hashing (CB-SPH). Under the security model for the leakage-resilient certificate-based encryption (LR-CBE), we show how to constru...
Abstract. Smooth Projective Hash Functions (SPHFs), also known as Hash Proof Systems, were first int...
Abstract. We present a new Certificateless Public Key Encryption (CL-PKE) scheme whose security is p...
As an important primitive, attribute-based encryption (ABE) has attracted much attention in the rela...
International audienceSmooth projective hashing has proven to be an extremely useful primitive, in p...
Abstract. Smooth projective hash functions have been used as building block for various cryptographi...
Abstract. Wepresent new frameworks for constructing public-key encryption schemes satisfying key-dep...
Abstract: Certificate-based encryption (CBE) is an important class of public key encryption but the ...
Certificate-based encryption (CBE) is an important class of public key encryption but the existing s...
Hash Proof Systems or Smooth Projective Hash Functions (SPHFs) are a form of implicit arguments intr...
The security for many certificate-based encryption schemes was considered under the ideal condition,...
International audienceAn important problem in secure multi-party computation is the design of protoc...
Certificate-based encryption is a useful primitive that combines traditional public key encryption a...
Abstract. In this paper we present a general framework for passwordbased authenticated key exchange ...
Password-authenticated key exchange (PAKE) protocols allow users sharing a password to agree upon a ...
Recently, a lot of researches focused on identity-based encryption (IBE). The advantage of this sche...
Abstract. Smooth Projective Hash Functions (SPHFs), also known as Hash Proof Systems, were first int...
Abstract. We present a new Certificateless Public Key Encryption (CL-PKE) scheme whose security is p...
As an important primitive, attribute-based encryption (ABE) has attracted much attention in the rela...
International audienceSmooth projective hashing has proven to be an extremely useful primitive, in p...
Abstract. Smooth projective hash functions have been used as building block for various cryptographi...
Abstract. Wepresent new frameworks for constructing public-key encryption schemes satisfying key-dep...
Abstract: Certificate-based encryption (CBE) is an important class of public key encryption but the ...
Certificate-based encryption (CBE) is an important class of public key encryption but the existing s...
Hash Proof Systems or Smooth Projective Hash Functions (SPHFs) are a form of implicit arguments intr...
The security for many certificate-based encryption schemes was considered under the ideal condition,...
International audienceAn important problem in secure multi-party computation is the design of protoc...
Certificate-based encryption is a useful primitive that combines traditional public key encryption a...
Abstract. In this paper we present a general framework for passwordbased authenticated key exchange ...
Password-authenticated key exchange (PAKE) protocols allow users sharing a password to agree upon a ...
Recently, a lot of researches focused on identity-based encryption (IBE). The advantage of this sche...
Abstract. Smooth Projective Hash Functions (SPHFs), also known as Hash Proof Systems, were first int...
Abstract. We present a new Certificateless Public Key Encryption (CL-PKE) scheme whose security is p...
As an important primitive, attribute-based encryption (ABE) has attracted much attention in the rela...