scispace - formally typeset
Open AccessBook

Advances in Cryptology - CRYPTO '98

Hugo Krawczyk
Reads0
Chats0
About
The article was published on 1998-01-01 and is currently open access. It has received 651 citations till now.

read more

Citations
More filters
Book ChapterDOI

On the Security of TLS-DHE in the Standard Model

TL;DR: The notion of authenticated and confidential channel establishment ACCE is defined as a new security model which captures precisely the security properties expected from TLS in practice, and the combination of the TLS Handshake with data encryption in the TLS Record Layer can be proven secure in this model.
Book ChapterDOI

Public-Key Encryption Schemes with Auxiliary Inputs

TL;DR: This work constructs public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one that may reveal the secretKey information-theoretically).
Book ChapterDOI

A Group Signature Scheme with Improved Efficiency (Extended Abstract)

TL;DR: This paper proposes a new group signature scheme that is well suited for large groups, i.e., the length of the group’s public key and of signatures do not depend on the size of the groups.
Book ChapterDOI

Probabilistic public key encryption with equality test

TL;DR: A (probabilistic) public key encryption (PKE) scheme such that when being implemented in a bilinear group, anyone is able to check whether two ciphertexts are encryptions of the same message.
Book ChapterDOI

Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems

TL;DR: It is shown that two variants of Stern's identification scheme are provably secure against concurrent attack under the assumptions on the worst-case hardness of lattice problems.