Quadratic residuosity problem

Known as: Quadratic residuacity problem, Quadratic residuocity problem 
The quadratic residuosity problem in computational number theory is to decide, given integers and , whether is a quadratic residue modulo or not.Here… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1977-2017
024619772017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
  • Marc Joye
  • 2015 12th International Joint Conference on e…
  • 2015
This paper presents a key-private public-key cryptosystem. More specifically, in addition to confidentiality, it provides privacy… (More)
Is this relevant?
2014
2014
Identity Based Encryption (IBE) has been constructed from bilinear pairings, lattices and quadratic residuosity. The latter is an… (More)
  • figure 1
  • table 1
  • figure 2
Is this relevant?
2009
2009
We introduce the first universally anonymous, thus key-private, IBE whose security is based on the standard quadratic residuosity… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We propose a simple and general framework for constructing oblivious transfer (OT) protocols that are efficient, universally… (More)
  • figure 3
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) on elliptic curves. One… (More)
  • table 1
Is this relevant?
2006
2006
At Eurocrypt ’02 Cramer and Shoup [7] proposed a general paradigm to construct practical public-key cryptosystems secure against… (More)
  • table 1
Is this relevant?
2005
2005
 
Is this relevant?
2004
2004
We present identity-based identification (resp. encryption, signature, blind signature, ring signature) from composite degree… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We present a novel public key cryptosystem in which the public key of a subscriber can be chosen to be a publicly known value… (More)
Is this relevant?
Highly Cited
1987
Highly Cited
1987
to compute the value f(x 1 ; :::; x n), where f is a predetermined function. Loosely speaking, an n-party protocol for this… (More)
Is this relevant?