Mihir Bellare

Results: 34



#Item
1

Multi-Signatures in the Plain Public-Key Model and a General Forking Lemma Mihir Bellare Gregory Neven

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2007-03-07 03:55:29
    2

    A Preliminary version of this paper appeared in Proceedings of the 31st Annual IEEE Symposium on the Foundations of Computer Science, IEEERandomness in Interactive Proofs Mihir Bellare

    Add to Reading List

    Source URL: www.wisdom.weizmann.ac.il

    Language: English - Date: 2014-06-22 06:24:29
      3Cryptography / Secret sharing / Public-key cryptography / Proactive secret sharing / Commitment scheme / Ciphertext indistinguishability / Adversary model / Digital signature / Encryption / Information-theoretic security

      The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

      Add to Reading List

      Source URL: web.cs.ucdavis.edu

      Language: English - Date: 2007-08-20 03:37:31
      4

      Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions Mihir Bellare Daniele Micciancio

      Add to Reading List

      Source URL: www.cs.bris.ac.uk

      Language: English - Date: 2007-01-08 08:20:23
        5

        Policy-based signatures Georg Fuchsbauer IST Austria joint work with Mihir Bellare available on eprint

        Add to Reading List

        Source URL: www.di.ens.fr

        Language: English - Date: 2013-10-29 07:08:12
          6

          Verifiable Partial Key Escrow MIHIR BELLARE* SHAFI GOLDWASSER~ Abstract

          Add to Reading List

          Source URL: groups.csail.mit.edu

          Language: English - Date: 2003-04-15 15:57:55
            7

            Technical Report CS97-529, Department of Computer Science and Engineering, University of California at San Diego, MarchRevised MarchA Note on Negligible Functions Mihir Bellare∗ Dept. of Computer Science

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2002-03-01 13:12:41
              8IP / Interactive proof system / Mathematics / Zero-knowledge proof / Soundness / Expected value / Non-interactive zero-knowledge proof / Information / Cryptographic protocols / Applied mathematics / Proof of knowledge

              Proving Computational Ability Mihir Bellare Oded Goldreichy August 1992

              Add to Reading List

              Source URL: www.wisdom.weizmann.ac.il

              Language: English - Date: 2014-06-22 06:28:46
              9Expander graph / Random walk / Adjacency matrix / Expected value / Mathematics / Algebraic graph theory / Stochastic processes

              Addendum to the paper \Randomness in Interactive Proofs" Mihir Bellare Oded Goldreichy

              Add to Reading List

              Source URL: www.wisdom.weizmann.ac.il

              Language: English - Date: 2014-06-22 06:24:28
              10Complexity classes / Probabilistic complexity theory / Quantum complexity theory / Analysis of algorithms / Randomized algorithm / PP / NP / P / Theoretical computer science / Computational complexity theory / Applied mathematics

              Uniform Generation of NP-witnesses using an NP-oracle Mihir Bellare Oded Goldreichy

              Add to Reading List

              Source URL: www.wisdom.weizmann.ac.il

              Language: English - Date: 2014-06-22 06:24:53
              UPDATE