Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ESORICS (25. : 2020 : Online) Computer Security – ESORICS 2020 ; Part 2
1. Verfasser: Hanaoka, Goichiro (VerfasserIn)
Weitere Verfasser: Komatsu, Misaki (VerfasserIn), Ohara, Kazuma (VerfasserIn), Sakai, Yusuke (VerfasserIn), Yamada, Shota (VerfasserIn)
Pages:2020
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Hardware Fingerprinting for the ARINC 429 Avionic Bus 2020 Gilboa-Markevich, Nimrod
Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems 2020 Aiolli, Fabio
Fooling Primality Tests on Smartcards 2020 Sedlacek, Vladimir
Active Re-identification Attacks on Periodically Released Dynamic Social Graphs 2020 Chen, Xihui
Post-Quantum Adaptor Signatures and Payment Channel Networks 2020 Esgin, Muhammed F.
PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution 2020 Xiao, Yang
Identity-Based Authenticated Encryption with Identity Confidentiality 2020 Zhao, Yunlei
Updatable Blockchains 2020 Ciampi, Michele
2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely 2020 Duong, Tuyet
Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication 2020 Paul, Sebastian
Security Analysis Linear-Complexity Private Function Evaluation is Practical 2020 Holz, Marco
They Might NOT Be Giants Crafting Black-Box Adversarial Examples Using Particle Swarm Optimization 2020 Mosli, Rayan
Biased RSA Private Keys: Origin Attribution of GCD-Factorable Keys 2020 Janovsky, Adam
MAC-in-the-Box: Verifying a Minimalistic Hardware Design for MAC Computation 2020 Küennemann, Robert
Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols 2020 Cortier, Véronique
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing 2020 Boyen, Xavier
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key 2020 Liu, Wenling
When Is a Test Not a Proof? 2020 McMurtry, Eleanor
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorohic Encryption 2020 Susilo, Willy
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition 2020 Hanaoka, Goichiro
Alle Artikel auflisten