The quadratic residuosity problem in computational number theory is to decide, given integers and , whether is a quadratic residue modulo or not.Hereâ€¦Â (More)

Semantic Scholar uses AI to extract papers important to this topic.

2015

2015

- Marc Joye
- 2015 12th International Joint Conference on eâ€¦
- 2015

This paper presents a key-private public-key cryptosystem. More specifically, in addition to confidentiality, it provides privacyâ€¦Â (More)

Is this relevant?

2014

2014

- Michael Clear, Hitesh Tewari, Ciaran McGoldrick
- AFRICACRYPT
- 2014

Identity Based Encryption (IBE) has been constructed from bilinear pairings, lattices and quadratic residuosity. The latter is anâ€¦Â (More)

Is this relevant?

2009

2009

- Giuseppe Ateniese, Paolo Gasti
- CT-RSA
- 2009

We introduce the first universally anonymous, thus key-private, IBE whose security is based on the standard quadratic residuosityâ€¦Â (More)

Is this relevant?

Highly Cited

2007

Highly Cited

2007

- Chris Peikert, Vinod Vaikuntanathan, Brent Waters
- CRYPTO
- 2007

We propose a simple and general framework for constructing oblivious transfer (OT) protocols that are efficient, universallyâ€¦Â (More)

Is this relevant?

Highly Cited

2007

Highly Cited

2007

- Dan Boneh, Craig Gentry, Michael Hamburg
- 48th Annual IEEE Symposium on Foundations ofâ€¦
- 2007

Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) on elliptic curves. Oneâ€¦Â (More)

Is this relevant?

2006

2006

- Harunaga Hiwatari, Keisuke Tanaka
- IEICE Transactions
- 2006

At Eurocrypt â€™02 Cramer and Shoup [7] proposed a general paradigm to construct practical public-key cryptosystems secure againstâ€¦Â (More)

Is this relevant?

2005

2004

2004

- Man Ho Au, Victor K.-W. Wei
- IACR Cryptology ePrint Archive
- 2004

We present identity-based identification (resp. encryption, signature, blind signature, ring signature) from composite degreeâ€¦Â (More)

Is this relevant?

Highly Cited

2001

Highly Cited

2001

- Clifford Cocks
- IMA Int. Conf.
- 2001

We present a novel public key cryptosystem in which the public key of a subscriber can be chosen to be a publicly known valueâ€¦Â (More)

Is this relevant?

Highly Cited

1987

Highly Cited

1987

- Oded Goldreich, Ronen Vainish
- CRYPTO
- 1987

to compute the value f(x 1 ; :::; x n), where f is a predetermined function. Loosely speaking, an n-party protocol for thisâ€¦Â (More)

Is this relevant?