Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

2 3 4 5 6
zadetkov: 228
31.
  • Constant-Round Client-Aided... Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications
    MORITA, Hiraku; ATTRAPADUNG, Nuttapong; TERUYA, Tadanori ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2020/01/01, 2020-1-1, 20200101, Letnik: E103.A, Številka: 1
    Journal Article
    Recenzirano

    We present an improved constant-round secure two-party protocol for integer comparison functionality, which is one of the most fundamental building blocks in secure computation. Our protocol is in ...
Celotno besedilo
Dostopno za: NUK, UL, UM
32.
  • Verifiable Privacy-Preservi... Verifiable Privacy-Preserving Data Aggregation Protocols
    YASUDA, Satoshi; KOSEKI, Yoshihiro; SAKAI, Yusuke ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2020/01/01, 2020-1-1, 20200101, Letnik: E103.A, Številka: 1
    Journal Article
    Recenzirano

    Homomorphic encryption allows computation over encrypted data, and can be used for delegating computation: data providers encrypt their data and send them to an aggregator, who can then perform ...
Celotno besedilo
Dostopno za: NUK, UL, UM
33.
  • Card-Based Protocols Using ... Card-Based Protocols Using Regular Polygon Cards
    SHINAGAWA, Kazumasa; MIZUKI, Takaaki; SCHULDT, Jacob C.N. ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 01/2017, Letnik: E100.A, Številka: 9
    Journal Article
    Recenzirano
    Odprti dostop

    Cryptographic protocols enable participating parties to compute any function of their inputs without leaking any information beyond the output. A card-based protocol is a cryptographic protocol ...
Celotno besedilo
Dostopno za: NUK, UL, UM

PDF
34.
  • A Setup-Free Threshold Encr... A Setup-Free Threshold Encryption Scheme for the Bitcoin Protocol and Its Applications
    HANAOKA, Goichiro; SAKAI, Yusuke; SHIMIZU, Toshiya ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2020/01/01, 2020-1-1, 20200101, Letnik: E103.A, Številka: 1
    Journal Article
    Recenzirano

    Let us consider a situation where someone wants to encrypt his/her will on an existing blockchain, e.g. Bitcoin, and allow an encrypted will to be decryptable only if designated members work ...
Celotno besedilo
Dostopno za: NUK, UL, UM
35.
  • Two-Dimensional Representat... Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More
    Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru Topics in Cryptology – CT-RSA 2012
    Book Chapter
    Recenzirano

    Very recently, Hofheinz, Jager, and Kiltz proposed novel digital signature schemes that yield significantly shorter signatures. However, in contrast to such remarkably short signatures, the size of ...
Celotno besedilo
36.
Celotno besedilo
37.
  • Efficient Chosen Ciphertext... Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
    Hanaoka, Goichiro; Kurosawa, Kaoru Advances in Cryptology - ASIACRYPT 2008
    Book Chapter
    Recenzirano
    Odprti dostop

    Recently Cash, Kiltz, and Shoup 13 showed a variant of the Cramer-Shoup (CS) scheme 14 whose chosen-ciphertext (CCA) security relies on the computational Diffie-Hellman (CDH) assumption. The cost for ...
Celotno besedilo

PDF
38.
  • A New Combiner for Key Enca... A New Combiner for Key Encapsulation Mechanisms
    HANAOKA, Goichiro; MATSUDA, Takahiro; SCHULDT, Jacob C. N. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 12/2019, Letnik: E102.A, Številka: 12
    Journal Article
    Recenzirano

    Key encapsulation mechanism (KEM) combiners, recently formalized by Giacon, Heuer, and Poettering (PKC'18), enable hedging against insecure KEMs or weak parameter choices by combining ingredient KEMs ...
Celotno besedilo
Dostopno za: NUK, UL, UM
39.
  • Attribute-Based Encryption ... Attribute-Based Encryption for Range Attributes
    ATTRAPADUNG, Nuttapong; HANAOKA, Goichiro; OGAWA, Kazuto ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 09/2018, Letnik: E101.A, Številka: 9
    Journal Article
    Recenzirano

    Attribute-Based Encryption (ABE) is an advanced form of public-key encryption where access control mechanisms based on attributes and policies are possible. In conventional ABE, attributes are ...
Celotno besedilo
Dostopno za: NUK, UL, UM
40.
  • Generic Constructions for C... Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption
    Yamada, Shota; Attrapadung, Nuttapong; Hanaoka, Goichiro ... Lecture notes in computer science
    Book Chapter
    Recenzirano
    Odprti dostop

    In this paper we propose generic conversions for transforming a chosen-plaintext (CPA) secure attribute-based encryption (ABE) to a chosen-ciphertext (CCA) secure ABE. The only known generic ...
Celotno besedilo

PDF
2 3 4 5 6
zadetkov: 228

Nalaganje filtrov