Skip to search formSkip to main content

You are currently offline. Some features of the site may not work correctly.

Semantic Scholar uses AI to extract papers important to this topic.

2020

2020

Existing privacy preserving schemes have attained maximum privacy level either using the exponential modular operations or the… Expand

Is this relevant?

2014

2014

Three approaches are currently used for devising identity-based encryption schemes. They build on pairings, quadratic residues… Expand

Is this relevant?

2010

2010

We propose new and improved instantiations of lossy trapdoor functions (Peikert and Waters, STOC ’08), and correlation-secure… Expand

Is this relevant?

2009

2009

We introduce the first universally anonymous, thus key-private, IBE whose security is based on the standard quadratic residuosity… Expand

Is this relevant?

2007

2007

In this paper, we study the quadratic residuosity problem (QRP). Using the methods of integer classification, we give formulae of… Expand

Is this relevant?

2005

2005

We present a general framework for constructing two-message oblivious transfer protocols using a modification of Cramer and Shoup… Expand

Is this relevant?

2005

2005

An airfoil member for a land vehicle in particular for fixing to the roof of a cab of a tractor-trailer rig, in which the airfoil… Expand

Is this relevant?

Highly Cited

2001

Highly Cited

2001

We present a novel public key cryptosystem in which the public key of a subscriber can be chosen to be a publicly known value… Expand

Is this relevant?

Highly Cited

2001

Highly Cited

2001

We present several new and fairly practical public-key encryption schemes and prove them secure against adaptive chosen… Expand

Is this relevant?

Highly Cited

1997

Highly Cited

1997

We establish the following, quite unexpected, result: replication of data for the computational private information retrieval… Expand

Is this relevant?