, , p.91
, Generic Construction of a UC-Secure OT Scheme, p.93
, Very Efficient Oblivious Transfer from QA-NIZK, p.105
Efficient lattice (H)IBE in the standard model, LNCS, vol.6110, pp.553-572, 2010. ,
SPHF-friendly non-interactive commitments, Kazue Sako and Palash Sarkar, vol.8269, pp.214-234 ,
URL : https://hal.archives-ouvertes.fr/hal-00915542
, , 2013.
Identity-based encryption gone wild, Gregory Neven, and Nigel Smart, vol.II, pp.300-311, 2006. ,
Smooth projective hashing for conditionally extractable commitments, LNCS, vol.5677, pp.671-689, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00419145
Structure-preserving signatures and commitments to group elements, CRYPTO 2010, vol.6223, pp.209-236, 2010. ,
Generalized key delegation for hierarchical identity-based encryption, LNCS, vol.4734, pp.139-154, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-00918551
Dual system encryption framework in prime-order groups via computational pair encodings, ASIACRYPT 2016, Part II, vol.10032, p.2016 ,
Efficient selective-ID secure identity based encryption without random oracles, LNCS, vol.3027, pp.223-238, 2004. ,
Efficient UC-secure authenticated key-exchange for algebraic languages, LNCS, vol.7778, pp.272-291, 2013. ,
New techniques for SPHFs and efficient one-round PAKE protocols, CRYPTO 2013, Part I, vol.8042, pp.449-475, 2013. ,
Hierarchical identity based encryption with constant size ciphertext, LNCS, vol.3494, pp.440-456, 2005. ,
, , 2005.
Short group signatures, LNCS, vol.3152, pp.41-55, 2004. ,
Generic construction of UCsecure oblivious transfer, LNCS, vol.15, pp.65-86, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01382954
Structure-preserving smooth projective hashing, ASIACRYPT 2016, Part II, vol.10032, pp.339-369, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01382952
Adaptive oblivious transfer and generalization, ASIACRYPT 2016, Part II, vol.10032, pp.217-247, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01382953
Almost optimal oblivious transfer from QA-NIZK, LNCS, vol.17, pp.579-598, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01610411
Efficient id-based designated verifier signature, International Conference on Availability, Reliability and Security, vol.12, issue.44, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01610412
Efficient chosen-ciphertext secure identity-based encryption with wildcards, LNCS, vol.4586, pp.274-292, 2007. ,
Identity-based encryption from the Weil pairing, LNCS, vol.2139, pp.213-229, 2001. ,
Batch Groth-Sahai, LNCS, vol.10, pp.218-235, 2010. ,
URL : https://hal.archives-ouvertes.fr/inria-00577167
Signatures on randomizable ciphertexts, LNCS, vol.6571, pp.403-422, 2011. ,
URL : https://hal.archives-ouvertes.fr/inria-00542643
Hierarchical) identitybased encryption from affine message authentication, CRYPTO 2014, Part I, vol.8616, pp.408-425, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01239920
Authenticated key exchange secure against dictionary attacks, LNCS, vol.1807, pp.139-155, 2000. ,
Roundoptimal privacy-preserving protocols with smooth projective hash functions, LNCS, vol.7194, pp.94-111, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00672939
Universally composable security: A new paradigm for cryptographic protocols, 42nd FOCS, pp.136-145, 2001. ,
The random oracle is false, Journal of Computer and System Sciences, vol.49, issue.1, pp.24-39, 1994. ,
A simpler variant of universally composable security for standard multiparty computation, CRYPTO 2015, Part II, vol.9216, pp.3-22 ,
, , 2015.
Oblivious transfer with access control, ACM CCS 09, pp.131-140, 2009. ,
Efficient password authenticated key exchange via oblivious transfer, LNCS, vol.7293, pp.449-466, 2012. ,
Formal security treatments for signatures from identitybased encryption, LNCS, vol.4784, pp.218-227, 2007. ,
Improved dual system ABE in prime-order groups via predicate encodings, EUROCRYPT 2015, Part II, vol.9057, pp.595-624, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01220358
Universally composable password-based key exchange, LNCS, vol.3494, pp.404-421, 2005. ,
Bonsai trees, or how to delegate a lattice basis, LNCS, vol.6110, pp.523-552 ,
, , 2010.
Universally composable notions of key exchange and secure channels, LNCS, vol.2332, pp.337-351, 2002. ,
, , 2002.
Efficient, adaptively secure, and composable oblivious transfer with a single, global CRS, LNCS, vol.7778, pp.73-88, 2013. ,
, , 2013.
An identity based encryption scheme based on quadratic residues, 8th IMA International Conference on Cryptography and Coding, vol.2260, pp.360-363, 2001. ,
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, LNCS, vol.1462, pp.13-25, 1998. ,
Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption, LNCS, vol.2332, pp.45-64, 2002. ,
Identity-based encryption from the Diffie-Hellman assumption, CRYPTO 2017, Part I, vol.10401, pp.537-569, 2017. ,
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976. ,
An algebraic framework for Diffie-Hellman assumptions, CRYPTO 2013, Part II, vol.8043, pp.129-147, 2013. ,
A public key cryptosystem and a signature scheme based on discrete logarithms, LNCS, vol.84, pp.10-18, 1984. ,
Guide to pairing-based cryptography, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01579628
Round-optimal composable blind signatures in the common reference string model, LNCS, vol.4117, pp.60-77, 2006. ,
Blind identity-based encryption and simulatable oblivious transfer, LNCS, vol.4833, pp.265-282, 2007. ,
, , 2007.
Universally composable adaptive oblivious transfer, LNCS, vol.5350, pp.179-197, 2008. ,
Identity-based encryption from codes with rank metric, Part III, vol.10403, pp.194-224, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01589463
A framework for passwordbased authenticated key exchange, LNCS, vol.2656, pp.524-543, 2003. ,
A digital signature scheme secure against adaptive chosen-message attacks, SIAM Journal on Computing, vol.17, issue.2, pp.281-308, 1988. ,
The knowledge complexity of interactive proof systems, SIAM Journal on Computing, vol.18, issue.1, pp.186-208, 1989. ,
Trapdoors for hard lattices and new cryptographic constructions, 40th ACM STOC, pp.197-206, 2008. ,
Hierarchical ID-based cryptography, LNCS, vol.2501, pp.548-566, 2002. ,
Efficient non-interactive proof systems for bilinear groups, LNCS, vol.4965, pp.415-432, 2008. ,
Comparing the pairing efficiency over compositeorder and prime-order elliptic curves, LNCS, vol.13, pp.357-372, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00812960
A pseudorandom generator from any one-way function, SIAM Journal on Computing, vol.28, issue.4, pp.1364-1396, 1999. ,
Shorter quasi-adaptive NIZK proofs for linear subspaces, Kazue Sako and Palash Sarkar, editors, ASIACRYPT 2013, Part I, vol.8269, pp.1-20, 2013. ,
Dual-system simulationsoundness with applications to UC-PAKE and more, ASIACRYPT 2015, Part I, vol.9452, pp.630-655, 2015. ,
Smooth projective hashing and two-message oblivious transfer, LNCS, vol.3494, pp.78-95, 2005. ,
Smooth projective hashing and password-based authenticated key exchange from lattices, LNCS, vol.5912, pp.636-652, 2009. ,
Oblivious signaturebased envelope, Elizabeth Borowsky and Sergio Rajsbaum, editors, 22nd ACM PODC, pp.182-189, 2003. ,
Highly-efficient universally-composable commitments based on the DDH assumption, LNCS, vol.6632, pp.446-466, 2011. ,
, , 2011.
New proof methods for attribute-based encryption: Achieving full security through selective techniques, LNCS, vol.7417, pp.180-198, 2012. ,
Public-key cryptosystems provably secure against chosen ciphertext attacks, 22nd ACM STOC, pp.427-437, 1990. ,
Fully secure functional encryption with general relations from the decisional linear assumption, CRYPTO 2010, vol.6223, pp.191-208, 2010. ,
Non-interactive and information-theoretic secure verifiable secret sharing, LNCS, vol.576, pp.129-140, 1992. ,
Non-interactive zeroknowledge proof of knowledge and chosen ciphertext attack, LNCS, vol.576, pp.433-444, 1992. ,
A method for obtaining digital signature and public-key cryptosystems, Communications of the Association for Computing Machinery, vol.21, issue.2, pp.120-126, 1978. ,
Universal designated-verifier signatures, LNCS, vol.2894, pp.523-542, 2003. ,
Identity-based cryptosystems and signature schemes, LNCS, vol.84, pp.47-53, 1984. ,
Fuzzy identity-based encryption, LNCS, vol.3494, pp.457-473, 2005. ,
Efficient identity-based encryption without random oracles, EUROCRYPT 2005, pp.114-127, 2005. ,
Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions, LNCS, vol.5677, pp.619-636, 2009. ,
Digital signcryption or how to achieve cost(signature & encryption) ? cost(signature) + cost(encryption) ,
, LNCS, vol.1294, pp.165-179, 1997.