, Hence, if the improved Jutla-Roy construction [153] is plugged into the high-level construction of [175], the signature length reduces to 5 group elements under the DLIN assumption and 3 elements under the SXDH assumption. The QA-NIZK proofs of [153] thus provide our construction with as short signatures as those of Blazy, Kiltz and Pan [36] with the benefit of shorter private keys. Finally, together with Marc Joye and Moti Yung [174], we used our LHSPS systems to design (albeit in a non-generic manner) fully distributed non-interactive adaptively secure threshold signatures with round-optimal key generation. We expect our LHSPS primitive to find other applications in the future. For example, Catalano, Marcedone and Puglisi [79] recently used them to devise linearly homomorphic signatures which can operate in online/offline mode, Constructions of Non-Malleable Primitives from Structure-Preserving Cryptography gument of linear subspace membership, vol.106
, Disjunctions for hash proof systems: New constructions and applications. Cryptology ePrint Archive, vol.483, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01068420
Constantsize structure-preserving signatures: Generic constructions and simple assumptions, Wang and Sako, vol.247, pp.4-24 ,
Tagged one-time signatures: Tight security and optimal tag size, Kurosawa and Hanaoka, vol.165, pp.312-331 ,
Structurepreserving signatures and commitments to group elements, Advances in Cryptology -CRYPTO 2010, vol.6223, pp.209-236, 2010. ,
Optimal structure-preserving signatures in asymmetric bilinear groups, Lecture Notes in Computer Science, vol.6841, pp.649-666, 2011. ,
Signing on elements in bilinear groups for modular protocol design, IACR Cryptology ePrint Archive, p.133, 2010. ,
Group to group commitments do not shrink, Pointcheval and Johansson, vol.220, pp.301-317 ,
Revocation for delegatable anonymous credentials, Catalano, vol.80, pp.423-440 ,
Efficient lattice (H)IBE in the standard model, EUROCRYPT, pp.553-572, 2010. ,
Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE, CRYPTO, 2010. ,
Computing on authenticated data, pp.1-20 ,
On the security of join signature and encryption, pp.83-107 ,
Provable data possession at untrusted stores, vol.212, pp.598-609 ,
Practical group signatures without random oracles, IACR Cryptology ePrint Archive, p.385, 2005. ,
A practical and provably secure coalition-resistant group signature scheme, CRYPTO'00, pp.255-270, 2000. ,
Proofs of storage from homomorphic identification protocols, pp.319-333 ,
Quasi-efficient revocation in group signatures, Financial Cryptography, pp.183-197, 2002. ,
, Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004.
Dual system encryption via doubly selective security: Framework, fully secure functional encryption for regular languages, and more, pp.557-577 ,
A revocable group signature scheme from identity-based revocation techniques: Achieving constant-size revocation list, Applied Cryptography and Network Security (ACNS'14), pp.419-437, 2014. ,
Attribute-based encryption schemes with constant-size ciphertexts, Theoretical Computer Science, issue.422, pp.15-38, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00763158
Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation, Public Key Cryptography, pp.384-402, 2010. ,
Homomorphic network coding signatures in the standard model, vol.80, pp.17-34 ,
Expressive key policy attribute-based encryption with constant-size ciphertexts, Public Key Cryptography, pp.90-108, 2011. ,
Computing on authenticated data: New privacy definitions and constructions, Wang and Sako, vol.247, pp.367-385 ,
URL : https://hal.archives-ouvertes.fr/hal-00730665
Efficient completely context-hiding quotable and linearly homomorphic signatures, Kurosawa and Hanaoka, vol.165, pp.386-404 ,
Efficient and provably secure identity-based signatures and signcryption from bilinear maps, ASIACRYPT, pp.515-532, 2005. ,
Randomizable proofs and delegatable anonymous credentials, pp.108-125 ,
P-signatures and noninteractive anonymous credentials, Lecture Notes in Computer Science, vol.4948, pp.356-374, 2008. ,
Public-key encryption in a multi-user setting: Security proofs and improvements, EUROCRYPT, pp.259-274, 2000. ,
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions, EUROCRYPT 2003, vol.2656, pp.614-629, 2003. ,
Random oracles are practical: A paradigm for designing efficient protocols, ACM Conference on Computer and Communications Security, pp.62-73, 1993. ,
Foundations of group signatures: The case of dynamic groups, CT-RSA 2005, vol.3376, pp.136-153, 2005. ,
One-way accumulators: A decentralized alternative to digital sinatures, EUROCRYPT, pp.274-285, 1993. ,
Divertible protocols and atomic proxy cryptography, EUROCRYPT, pp.127-144, 1998. ,
(hierarchical) identity-based encryption from affine message authentication, CRYPTO, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01239920
Noninteractive zero-knowledge, SIAM J. Comput, vol.20, issue.6, pp.1084-1118, 1991. ,
Non-interactive zero-knowledge and its applications (extended abstract), STOC, pp.103-112, 1988. ,
A closer look at PKI: Security and efficiency, vol.80, pp.458-475 ,
Efficient selective-ID secure identity-based encryption without random oracles, Cachin and Camenisch, vol.60, pp.223-238 ,
Short signatures without random oracles, Cachin and Camenisch, vol.60, pp.56-73 ,
Short signatures without random oracles and the SDH assumption in bilinear groups, J. Cryptology, vol.21, issue.2, pp.149-177, 2008. ,
Hierarchical identity based encryption with constant size ciphertext, pp.440-456 ,
Short group signatures, pp.41-55 ,
Identity-based encryption from the weil pairing, pp.213-229 ,
Homomorphic signatures for polynomial functions, pp.149-168 ,
Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures, vol.80, pp.1-16 ,
Signing a linear subspace: Signature schemes for network coding, Jarecki and Tsudik, vol.147, pp.68-87 ,
Collusion resistant broadcast encryption with short ciphertexts and private keys, Lecture Notes in Computer Science, vol.3621, pp.258-275, 2005. ,
Functional encryption: Definitions and challenges, TCC, pp.253-273, 2011. ,
Targeted malleability: homomorphic encryption for restricted computations, pp.350-366, 2012. ,
Group signatures with verifier-local revocation, vol.18, pp.168-177 ,
, Advances in Cryptology -CRYPTO 2003, 23rd Annual International Cryptology Conference, vol.2729, 2003.
Expressive subgroup signatures, SCN, pp.185-200, 2008. ,
Compact group signatures without random oracles, pp.427-444 ,
Full-domain subgroup hiding and constant-size group signatures, PKC 2007, vol.4450, pp.1-15, 2007. ,
Efficient revocation in group signatures, Public Key Cryptography, pp.190-206, 2001. ,
An efficient protocol for anonymously providing assurance of the container of the private key, Submission to the Trusted Computing Group, 2003. ,
Direct anonymous attestation, vol.18, pp.132-145 ,
, Advances in Cryptology -EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, vol.3027, 2004.
Efficient protocols for set membership and range proofs, pp.234-252 ,
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks, pp.351-368 ,
Efficient structure-preserving signature scheme from standard assumptions, SCN, pp.76-94, 2012. ,
Rethinking accountable privacy supporting services: extended abstract, Digital Identity Management, pp.1-8, 2008. ,
Structure preserving CCA secure encryption and applications, vol.168, pp.89-106 ,
An accumulator based on bilinear maps and efficient revocation for anonymous credentials, Jarecki and Tsudik, vol.147, pp.481-500 ,
Solving revocation with efficient update of anonymous credentials, SCN, pp.454-471, 2010. ,
Dynamic accumulators and application to efficient revocation of anonymous credentials, pp.61-76 ,
Fully anonymous attribute tokens from lattices, SCN, pp.57-75, 2012. ,
Universally composable security: A new paradigm for cryptographic protocols, FOCS, pp.136-145, 2001. ,
Universally composable commitments, pp.19-40 ,
The random oracle methodology, revisited (preliminary version), pp.209-218 ,
, Advances in Cryptology -CRYPTO 2013 -33rd Annual Cryptology Conference, vol.8043, 2013.
Bonsai trees, or how to delegate a lattice basis ,
Vector commitments and their applications, Kurosawa and Hanaoka, vol.165, pp.55-72 ,
Zero-knowledge sets with short proofs, pp.433-450 ,
URL : https://hal.archives-ouvertes.fr/hal-01110386
Adaptive pseudo-free groups and applications, pp.207-223 ,
URL : https://hal.archives-ouvertes.fr/hal-01110376
Efficient network coding signatures in the standard model, vol.109, pp.680-696 ,
Authenticating computation on groups: New homomorphic primitives and applications, ASIACRYPT (2), pp.193-212, 2014. ,
, Public Key Cryptography -PKC 2011 -14th International Conference on Practice and Theory in Public Key Cryptography, vol.6571, 2011.
Group encryption: Non-interactive realization in the standard model, pp.179-196 ,
A new hash-and-sign approach and structure-preserving signatures from dlin, SCN, pp.131-148, 2012. ,
Malleable proof systems and applications, Pointcheval and Johansson, vol.220, pp.281-300 ,
Verifiable elections that scale for free, Pointcheval and Johansson, vol.220, pp.479-496 ,
Group signatures, EUROCRYPT, pp.257-265, 1991. ,
Fully, (almost) tightly secure IBE from standard assumptions, Canetti and Garay, vol.73, pp.435-460 ,
Dual system groups and its applications -compact HIBE and more. Cryptology ePrint Archive, vol.265, 2014. ,
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, Lecture Notes in Computer Science, vol.1462, pp.13-25, 1998. ,
Signature schemes based on the strong rsa assumption, ACM-CCS, pp.46-51, 1999. ,
Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption, pp.45-64 ,
, Advances in Cryptology -EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol.3494, 2005.
, Theory of Cryptography -9th Theory of Cryptography Conference, TCC 2012, vol.7194, 2012.
Non-interactive and non-malleable commitment, pp.141-150 ,
Non-interactive and reusable non-malleable commitment schemes, STOC, pp.426-437, 2003. ,
Dynamic fully anonymous short group signatures, VIETCRYPT, pp.193-210, 2006. ,
Society and group oriented cryptography: A new concept, Lecture Notes in Computer Science, vol.293, pp.120-127, 1987. ,
Computer security by redefining what a computer is, NSPW, pp.160-166, 1993. ,
Threshold cryptosystems, Lecture Notes in Computer Science, vol.435, pp.307-315, 1989. ,
Public key broadcast encryption for stateless receivers, Digital Rights Management Workshop, vol.2696, pp.61-80, 2002. ,
Efficient constructions of composable commitments and zero-knowledge proofs, pp.515-535 ,
Non-malleable cryptography (extended abstract), STOC, pp.542-552, 1991. ,
Non-malleable cryptography, SIAM Journal on Computing, vol.30, issue.2, pp.391-437, 2000. ,
A public-key cryptosystem and a signature scheme based on discrete logarithms, CRYPTO, pp.10-18, 1984. ,
Chosen ciphertext secure keyed-homomorphic public-key encryption, Kurosawa and Hanaoka, vol.165, pp.32-50 ,
An algebraic framework for diffie-hellman assumptions, Canetti and Garay, vol.73, pp.129-147 ,
On-line/off-line digital schemes, CRYPTO, pp.263-275, 1989. ,
How to prove yourself: Practical solutions to identification and signature problems, Lecture Notes in Computer Science, vol.263, pp.186-194, 1986. ,
Non-interactive and re-usable universally composable string commitments with adaptive security, vol.168, pp.468-485 ,
, Public Key Cryptography -PKC 2012 -15th International Conference on Practice and Theory in Public Key Cryptography, vol.7293, 2012.
, 24th Annual International CryptologyConference, vol.3152, 2004.
Improved security for linearly homomorphic signatures: A generic framework, vol.109, pp.697-714 ,
Automorphic signatures in bilinear groups and an application to round-optimal blind signatures, IACR Cryptology ePrint Archive, p.320, 2009. ,
Encrypting proofs on pairings and its application to anonymity for signatures, Pairing, pp.132-149, 2009. ,
New constructions of efficient simulation-sound commitments using encryption and their applications, Lecture Notes in Computer Science, vol.7178, pp.136-155, 2012. ,
Pairings for cryptographers, Discrete Appl. Math, vol.156, issue.16, 2008. ,
Strengthening zero-knowledge protocols using signatures, Lecture Notes in Computer Science, vol.2656, pp.177-194, 2003. ,
, Cryptology and Network Security, 8th International Conference, vol.5888, 2009.
Multi-trapdoor commitments and their applications to proofs of knowledge secure under concurrent man-in-the-middle attacks, pp.220-236 ,
Non-interactive verifiable computing: Outsourcing computation to untrusted workers, pp.465-482 ,
Secure network coding over the integers, Lecture Notes in Computer Science, vol.6056, pp.142-160, 2010. ,
Independent zero-knowledge sets, Lecture Notes in Computer Science, vol.4052, issue.2, pp.34-45, 2006. ,
Trapdoors for hard lattices and new cryptographic constructions, STOC, pp.197-206, 2008. ,
Hierarchical ID-based cryptography, Lecture Notes in Computer Science, vol.2501, pp.548-566, 2002. ,
Adaptive security in broadcast encryption systems (with short ciphertexts), pp.171-188 ,
, Advances in Cryptology -EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol.6110, 2010.
Proofs that yield nothing but their validity and a methodology of cryptographic protocol design, FOCS, pp.174-187, 1986. ,
The knowledge complexity of interactive proof systems, STOC, pp.291-304, 1985. ,
On the (in)security of the Fiat-Shamir paradigm, FOCS, pp.102-113, 2003. ,
A group signature scheme from lattice assumptions, Lecture Notes in Computer Science, vol.6477, pp.395-412, 2010. ,
Reducing trust in the PKG in identity-based cryptosystems, CRYPTO, pp.430-447, 2007. ,
Black-box accountable authority identitybased encryption, vol.213, pp.427-436 ,
Attribute-based encryption for finegrained access control of encrypted data, ACM Conference on Computer and Communications Security, pp.195-203, 2006. ,
Simulation-sound NIZK proofs for a practical language and constant size group signatures, Lecture Notes in Computer Science, vol.4284, pp.444-459, 2006. ,
Fully anonymous group signatures without random oracles, pp.164-180 ,
Homomorphic trapdoor commitments to group elements, IACR Cryptology ePrint Archive, 2009. ,
Non-interactive Zaps and new techniques for NIZK, pp.97-111 ,
Perfect non-interactive zero knowledge for NP, pp.339-358 ,
Efficient non-interactive proof systems for bilinear groups, pp.415-432 ,
, Proceedings, Advances in Cryptology -CRYPTO 2009, 29th Annual International Cryptology Conference, vol.5677, 2009.
The LSD broadcast encryption scheme, pp.47-60 ,
Better zeroknowledge proofs for lattice encryption and their application to group signatures, ASIACRYPT (1), pp.551-572, 2014. ,
Tightly secure signatures and public-key encryption, Safavi-Naini and Canetti, vol.230, pp.590-607 ,
Secure hybrid encryption from weakened key encapsulation, CRYPTO, pp.553-571, 2007. ,
Toward hierarchical identity-based encryption, pp.466-481 ,
Block-wise p-signatures and noninteractive anonymous credentials with efficient attributes, Lecture Notes in Computer Science, vol.7089, pp.431-450 ,
, , 2011.
Commitments and efficient zeroknowledge proofs from learning parity with noise, ASIACRYPT, pp.663-680, 2012. ,
Public Key Cryptography -PKC, 12th International Conference on Practice and Theory in Public Key Cryptography, vol.5443, 2009. ,
Homomorphic signature schemes, Lecture Notes in Computer Science, vol.2271, pp.244-262, 2002. ,
, Advances in Cryptology -EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol.5479, 2009.
Relatively-sound NIZKs and password-based key-exchange, vol.109, pp.485-503 ,
Shorter quasi-adaptive NIZK proofs for linear subspaces, Lecture Notes in Computer Science, vol.8269, issue.1, pp.1-20, 2013. ,
Dual-system simulation-soundness with applications to UC-PAKE and more, 2014. ,
Switching lemma for bilinear tests and constant-size NIZK proofs for linear subspaces, CRYPTO (2), pp.295-312, 2014. ,
Predicate encryption supporting disjunctions, polynomial equations, and inner products, pp.146-162 ,
Traceable signatures, Cachin and Camenisch, vol.60, pp.571-589 ,
Group encryption, pp.181-199 ,
Group signatures with efficient concurrent join, pp.198-214 ,
Secure scalable group signature with dynamic joins and separable authorities, vol.IJSN, pp.24-45, 2006. ,
, 21st Annual International Cryptology Conference, vol.2139, 2001.
Chosen-ciphertext security from tag-based encryption, TCC'06, vol.3876, pp.581-600, 2006. ,
, Advances in Cryptology -EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, vol.2332, 2002.
Chameleon signatures, NDSS, 2000. ,
About the security of MTI/C0 and MQV, Lecture Notes in Computer Science, vol.4116, pp.156-172, 2006. ,
, Advances in Cryptology -ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, vol.4833, 2007.
, Public-Key Cryptography -PKC 2013 -16th International Conference on Practice and Theory in Public-Key Cryptography, vol.7778, 2013.
Lattice-based group signatures with logarithmic signature size, ASIACRYPT, pp.41-61, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00920420
Universally convertible directed signatures, pp.682-701 ,
URL : https://hal.archives-ouvertes.fr/inria-00001121
, Advances in Cryptology -ASIACRYPT 2011 -17th International Conference on the Theory and Application of Cryptology and Information Security, vol.7073, 2011.
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption, pp.62-91 ,
Tools for simulating features of composite order bilinear groups in the prime order setting, Pointcheval and Johansson, vol.220, pp.318-335 ,
New techniques for dual system encryption and fully secure HIBE with short ciphertexts, pp.455-479 ,
Unbounded HIBE and attribute-based encryption, Paterson, vol.217, pp.547-567 ,
Group signatures with message-dependent opening in the standard model, CT-RSA, pp.286-306, 2014. ,
Born and raised distributed: Fully distributed noninteractive adaptively secure threshold signatures with short shares, PODC, pp.303-312, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00983149
Concise multi-challenge CCA-secure encryption and signatures with almost tight security, ASIACRYPT (2), pp.1-21, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01088108
Traceable group encryption, Canetti and Garay, vol.73, pp.592-610 ,
Linearly homomorphic structure-preserving signatures and their applications, Canetti and Garay, vol.73, pp.289-307 ,
Non-malleability from malleability: Simulation-sound quasi-adaptive NIZK proofs and CCA2-secure encryption from homomorphic signatures, vol.211 ,
URL : https://hal.archives-ouvertes.fr/hal-00983147
Group signatures with almost-for-free revocation, vol.230, pp.571-589 ,
Scalable group signatures with revocation, Pointcheval and Johansson, vol.220, pp.609-627 ,
Foward-secure signatures in untrusted update environments: Efficient and generic constructions, vol.212, pp.511-520 ,
Key evolution systems in untrusted update environments, ACM Transactions on Information and Systems Security, vol.13, issue.4, 2010. ,
Multi-use unidirectional proxy re-signatures, vol.213, pp.511-520 ,
URL : https://hal.archives-ouvertes.fr/inria-00357568
Unidirectional chosen-ciphertext-secure proxy reencryption, Lecture Notes in Computer Science, vol.4939, pp.360-379, 2008. ,
URL : https://hal.archives-ouvertes.fr/inria-00339530
Group signatures with verifier-local revocation and backward unlinkability in the standard model, vol.117, pp.498-517 ,
URL : https://hal.archives-ouvertes.fr/inria-00577255
Towards black-box accountable authority IBE with short ciphertexts and private keys, vol.117, pp.235-255 ,
URL : https://hal.archives-ouvertes.fr/inria-00356999
Efficient traceable signatures in the standard model, Pairing, pp.187-205, 2009. ,
Concise mercurial vector commitments and independent zeroknowledge sets with short proofs, pp.499-517 ,
Adaptively secure forward-secure non-interactive threshold cryptosystems, Lecture Notes in Computer Science, vol.7537, pp.1-21, 2011. ,
Efficient traceable signatures in the standard model, Theoretical Computer Science, vol.412, pp.1220-1242, 2011. ,
Non-interactive CCA-secure threshold cryptosystems with adaptive security: New framework and constructions, pp.75-93 ,
A simple construction of CCA2-secure public-key encryption under general assumptions, pp.241-254 ,
Improved zero-knowledge proofs of knowledge for the isis problem, and applications, Public Key Cryptography, pp.107-124, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00767548
Lattice-based identification schemes secure under active attacks, PKC, pp.162-179, 2014. ,
On simulation-sound trapdoor commitments, Cachin and Camenisch, vol.60, pp.382-400 ,
Signatures resilient to continual leakage on memory and computation, Lecture Notes in Computer Science, vol.6597, pp.89-106, 2011. ,
, Advances in Cryptology -ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, vol.5912, 2009.
, Advances in Cryptology -CRYPTO 2007, 27th Annual International Cryptology Conference, vol.4622, 2007.
Zero-knowledge sets, FOCS, pp.80-91, 2003. ,
Statistical zero-knowledge proofs with efficient provers: Lattice problems and more, CRYPTO, pp.282-298, 2003. ,
, Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, vol.5978, 2010.
Revocable group signature schemes with constant costs for signing and verifying, Jarecki and Tsudik, vol.147, pp.463-480 ,
Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps, pp.533-548 ,
Revocable group signatures with compact revocation list using accumulators, ICISC, pp.435-451, 2013. ,
Revocation and tracing schemes for stateless receivers, pp.41-62 ,
On cryptographic assumptions and challenges, pp.96-109 ,
Universal one-way hash functions and their cryptographic applications, STOC, pp.33-43, 1989. ,
DOI : 10.1145/73007.73011
Public-key cryptosystems provably secure against chosen ciphertext attacks, pp.427-437, 1990. ,
DOI : 10.1145/100216.100273
Accumulators from bilinear pairings and applications, Lecture Notes in Computer Science, vol.3376, pp.275-292 ,
DOI : 10.1007/978-3-540-30574-3_19
, , 2005.
Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings, Lecture Notes in Computer Science, vol.3329, pp.372-386, 2004. ,
DOI : 10.1007/978-3-540-30539-2_26
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-30539-2_26.pdf
, Advances in Cryptology -EURO-CRYPT 2014, 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2014.
, Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007.
, Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008.
A multi-trapdoor commitment scheme from the RSA assumption, ACISP, pp.182-199, 2010. ,
Fully secure functional encryption with general relations from the decisional linear assumption, pp.191-208 ,
Public-key cryptosystems based on composite degree residuosity classes, EUROCRYPT'99, pp.223-238, 1999. ,
, Advances in Cryptology -EUROCRYPT 2011 -30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol.6632, 2011.
Noninteractive statistical zero-knowledge proofs for lattice problems, CRYPTO, pp.536-553, 2008. ,
, Advances in Cryptology -ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, vol.5350, 2008.
, Advances in Cryptology -EURO-CRYPT 2012 -31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol.7237, 2012.
Rerandomizable RCCA encryption, pp.517-534 ,
DOI : 10.1007/978-3-540-74143-5_29
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-74143-5_29.pdf
Homomorphic encryption with CCA security, Lecture Notes in Computer Science, vol.5126, issue.2, pp.667-678, 2008. ,
Towards robust computation on encrypted data, pp.216-233 ,
Publicly verifiable privacy-preserving group decryption, In Inscrypt, pp.72-83, 2008. ,
, Advances in Cryptology -CRYPTO 2010, 30th Annual Cryptology Conference, vol.6223, 2010.
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack, Lecture Notes in Computer Science, vol.576, pp.433-444, 1991. ,
On lattices, learning with errors, random linear codes, and cryptography, STOC, pp.84-93, 2005. ,
Practical constructions and new proof methods for large universe attribute-based encryption, ACM Conference on Computer and Communications Security, pp.463-474, 2013. ,
, Advances in Cryptology -ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, vol.3788, 2005.
, Advances in Cryptology -CRYPTO 2012 -32nd Annual Cryptology Conference, vol.7417, 2012.
Non-malleable non-interactive zero knowledge and adaptive chosenciphertext security, FOCS, pp.543-553, 1999. ,
Fuzzy identity-based encryption, pp.457-473 ,
Group signatures with message-dependent opening, Pairing, pp.270-294, 2012. ,
Authenticated ID-based key exchange and remote log-in with simple token and pin number, Cryptology ePrint Archive, 2002. ,
A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants. IACR Cryptology ePrint Archive, p.74, 2007. ,
Identity-based cryptosystems and signature schemes, CRYPTO, pp.47-53, 1984. ,
Lower bounds for discrete logarithms and related problems, EURO-CRYPT, pp.256-266, 1997. ,
A proposal for an ISO standard for public key encryption (version 2.1). Manuscript, 2001. ,
, Advances in Cryptology -EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol.4965, 2008.
Practical forward secure group signature schemes, ACM Conference on Computer and Communications Security, pp.225-234, 2001. ,
DOI : 10.1145/502014.502015
URL : http://www.cs.berkeley.edu/~dawnsong/papers/grpsig.pdf
Blacklistable anonymous credentials: blocking misbehaving users without ttps, vol.212, pp.72-81 ,
Perea: towards practical ttp-free revocation in anonymous authentication, vol.213, pp.333-344 ,
Accumulating composites and improved group signing, Lecture Notes in Computer Science, vol.2894, pp.269-286, 2003. ,
, Advances in Cryptology -EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol.4004, 2006.
, Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, 1998.
, Proceedings, Advances in Cryptology -CRYPTO 2008, 28th Annual International Cryptology Conference, vol.5157, 2008.
, Advances in Cryptology -ASIACRYPT 2012 -18th International Conference on the Theory and Application of Cryptology and Information Security, vol.7658, 2012.
Efficient identity-based encryption without random oracles, pp.114-127 ,
Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions, pp.619-636 ,
, Advances in Cryptology -CRYPTO 2002, 22nd Annual International Cryptology Conference, vol.2442, 2002.
Shorter verifier-local revocation group signatures from bilinear maps, CANS, pp.126-143, 2006. ,
DOI : 10.1007/11935070_8
URL : http://eprint.iacr.org/2006/286.pdf