Open AccessBook
Advances in Cryptology - CRYPTO '98
Reads0
Chats0
About:
The article was published on 1998-01-01 and is currently open access. It has received 651 citations till now.read more
Citations
More filters
Book ChapterDOI
On the Security of TLS-DHE in the Standard Model
TL;DR: The notion of authenticated and confidential channel establishment ACCE is defined as a new security model which captures precisely the security properties expected from TLS in practice, and the combination of the TLS Handshake with data encryption in the TLS Record Layer can be proven secure in this model.
Book ChapterDOI
Public-Key Encryption Schemes with Auxiliary Inputs
TL;DR: This work constructs public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one that may reveal the secretKey information-theoretically).
Book ChapterDOI
A Group Signature Scheme with Improved Efficiency (Extended Abstract)
Jan Camenisch,Markus Michels +1 more
TL;DR: This paper proposes a new group signature scheme that is well suited for large groups, i.e., the length of the group’s public key and of signatures do not depend on the size of the groups.
Book ChapterDOI
Probabilistic public key encryption with equality test
TL;DR: A (probabilistic) public key encryption (PKE) scheme such that when being implemented in a bilinear group, anyone is able to check whether two ciphertexts are encryptions of the same message.
Book ChapterDOI
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems
TL;DR: It is shown that two variants of Stern's identification scheme are provably secure against concurrent attack under the assumptions on the worst-case hardness of lattice problems.