A survey of certificateless encryption schemes and security models
AW Dent - International Journal of Information Security, 2008 - Springer
This paper surveys the literature on certificateless encryption schemes. In particular, we
examine the large number of security models that have been proposed to prove the security …
examine the large number of security models that have been proposed to prove the security …
The algebraic group model and its applications
One of the most important and successful tools for assessing hardness assumptions in
cryptography is the Generic Group Model (GGM). Over the past two decades, numerous …
cryptography is the Generic Group Model (GGM). Over the past two decades, numerous …
Pinocchio: Nearly practical verifiable computation
To instill greater confidence in computations outsourced to the cloud, clients should be able
to verify the correctness of the results returned. To this end, we introduce Pinocchio, a built …
to verify the correctness of the results returned. To this end, we introduce Pinocchio, a built …
[HTML][HTML] Cryptographic primitives in blockchains
Blockchain, as one of the crypto-intensive creatures, has become a very hot topic recently.
Although many surveys have recently been dedicated to the security and privacy issues of …
Although many surveys have recently been dedicated to the security and privacy issues of …
SNARKs for C: Verifying program executions succinctly and in zero knowledge
An argument system for NP is a proof system that allows efficient verification of NP
statements, given proofs produced by an untrusted yet computationally-bounded prover …
statements, given proofs produced by an untrusted yet computationally-bounded prover …
Quadratic span programs and succinct NIZKs without PCPs
We introduce a new characterization of the NP complexity class, called Quadratic Span
Programs (QSPs), which is a natural extension of span programs defined by Karchmer and …
Programs (QSPs), which is a natural extension of span programs defined by Karchmer and …
[图书][B] Handbook of applied cryptography
AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …
important discipline that is not only the subject of an enormous amount of research, but …
Random oracles are practical: A paradigm for designing efficient protocols
We argue that the random oracle model—where all parties have access to a public random
oracle—provides a bridge between cryptographic theory and cryptographic practice. In the …
oracle—provides a bridge between cryptographic theory and cryptographic practice. In the …
Provable data possession at untrusted stores
We introduce a model for provable data possession (PDP) that allows a client that has
stored data at an untrusted server to verify that the server possesses the original data …
stored data at an untrusted server to verify that the server possesses the original data …
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again
The existence of succinct non-interactive arguments for NP (ie, non-interactive
computationally-sound proofs where the verifier's work is essentially independent of the …
computationally-sound proofs where the verifier's work is essentially independent of the …