Constrained Pseudorandom Functions and Their Applications
Top Cited Papers
- 1 January 2013
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- Vol. 2013, 280-300
- https://doi.org/10.1007/978-3-642-42045-0_15
Abstract
No abstract availableKeywords
This publication has 26 references indexed in Scilit:
- Constrained Pseudorandom Functions and Their ApplicationsLecture Notes in Computer Science, 2013
- Practical Multilinear Maps over the IntegersLecture Notes in Computer Science, 2013
- Foundations of garbled circuitsPublished by Association for Computing Machinery (ACM) ,2012
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private KeysLecture Notes in Computer Science, 2007
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private KeysLecture Notes in Computer Science, 2005
- Efficient Selective-ID Secure Identity-Based Encryption Without Random OraclesLecture Notes in Computer Science, 2004
- A Forward-Secure Public-Key Encryption SchemeLecture Notes in Computer Science, 2003
- Identity-Based Encryption from the Weil PairingSIAM Journal on Computing, 2003
- Applications of multilinear forms to cryptographyContemporary Mathematics, 2003
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993