<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Cryptographic protocols / Identity-based cryptography / ID-based encryption / Functional encryption / Garbled circuit / Encryption / Secure multi-party computation / Attribute-based encryption / RSA / Chosen-ciphertext attack
Date: 2017-10-01 05:36:24
Cryptography
Public-key cryptography
Cryptographic protocols
Identity-based cryptography
ID-based encryption
Functional encryption
Garbled circuit
Encryption
Secure multi-party computation
Attribute-based encryption
RSA
Chosen-ciphertext attack

Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions Zvika Brakerski∗ Alex Lombardi†

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 600,00 KB

Share Document on Facebook

Similar Documents

Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits∗ Dan Boneh† Craig Gentry‡

Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits∗ Dan Boneh† Craig Gentry‡

DocID: 1tpEx - View Document

2015 IEEE Symposium on Security and Privacy  TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits Ebrahim M. Songhori∗ , Siam U. Hussain∗ , Ahmad-Reza Sadeghi† , Thomas Schneider† , Farinaz Kous

2015 IEEE Symposium on Security and Privacy TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits Ebrahim M. Songhori∗ , Siam U. Hussain∗ , Ahmad-Reza Sadeghi† , Thomas Schneider† , Farinaz Kous

DocID: 1rrYP - View Document

The proceedings version of this paper appears in CCSThis is the full paper, an earlier version of which was circulated under the title “Garbling Schemes”. Foundations of Garbled Circuits Mihir Bellare1 1

The proceedings version of this paper appears in CCSThis is the full paper, an earlier version of which was circulated under the title “Garbling Schemes”. Foundations of Garbled Circuits Mihir Bellare1 1

DocID: 1pyIx - View Document

2015 IEEE Symposium on Security and Privacy  Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs Eli Ben-Sasson§ , Alessandro Chiesa∗ , Matthew Green† , Eran Tromer¶ , Madars Virza‡ ∗ ETH

2015 IEEE Symposium on Security and Privacy Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs Eli Ben-Sasson§ , Alessandro Chiesa∗ , Matthew Green† , Eran Tromer¶ , Madars Virza‡ ∗ ETH

DocID: 1mti2 - View Document

Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique∗ (Technical report – September 11, 2013) Luís T. A. N. Brandão† University of Lisbon

Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique∗ (Technical report – September 11, 2013) Luís T. A. N. Brandão† University of Lisbon

DocID: 1m1L6 - View Document