The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase key-privacy (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1970-2006 (17) 2007-2009 (19) 2010-2017 (15) 2021-2023 (4)
Publication types (Num. hits)
article(13) inproceedings(42)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 35 occurrences of 21 keywords

Results
Found 55 publication records. Showing 55 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
83Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai Orthogonality between Key Privacy and Data Privacy, Revisited. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
47Shigenori Yamakawa, Yang Cui 0001, Kazukuni Kobara, Manabu Hagiwara, Hideki Imai On the Key-Privacy Issue of McEliece Public-Key Encryption. Search on Bibsonomy AAECC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
45Agusti Solanas, Antoni Martínez-Ballesté Privacy Protection in Location-Based Services Through a Public-Key Privacy Homomorphism. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF public-key privacy homomorphism, location privacy
43Kenneth G. Paterson, Sriramkrishnan Srinivasan Building Key-Private Public-Key Encryption Schemes. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multiple trusted authorities, TA anonymity, standard model, public-key encryption, identity-based encryption, key-privacy
30E. Michael Power Developing a Culture of Privacy: A Case Study. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Raphael C.-W. Phan, Bok-Min Goi Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF n-party, cryptanalysis, dictionary attack, collusion, Password-authenticated key exchange, key privacy
28Ryotaro Hayashi 0001, Keisuke Tanaka Universally Anonymizable Public-Key Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cramer- Shoup, RSA-OAEP, anonymity, encryption, ElGamal, key-privacy
26Ryotaro Hayashi 0001, Tatsuaki Okamoto, Keisuke Tanaka An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Chung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, Sherman S. M. Chow An Efficient Signcryption Scheme with Key Privacy. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Ciphertext Anonymity, Gap Diffie-Hellman, Signcryption, Key Privacy
23Mihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval Key-Privacy in Public-Key Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
22Cynthia Dwork Differential Privacy: A Survey of Results. Search on Bibsonomy TAMC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Guomin Yang, Duncan S. Wong, Xiaotie Deng Analysis and Improvement of a Signcryption Scheme with Key Privacy. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Ashutosh Saxena Threshold SKI Protocol for ID-based Cryptosystems. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF secure key issuing, ID-based cryptography
18Dickson K. W. Chiu, Patrick C. K. Hung Privacy and Access Control Issues in Financial Enterprise Content Management. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Arif Tumer, Asuman Dogac, Ismail Hakki Toroslu A Semantic-Based User Privacy Protection Framework for Web Services. Search on Bibsonomy ITWP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Liang Ni 0001, Hengsheng Zhou, Yawei Zhang, Xiaoyan Liu, Bingke Gu Provably Secure Symmetric-Key Privacy-Preserving authenticated key agreement protocol. Search on Bibsonomy ICCNS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Qiang Wang 0020, Xue Qiu, Quan Zhang, Chaojing Tang Key Privacy in McEliece Public Key Cryptosystem. Search on Bibsonomy TrustCom The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Ya-Fen Chang, Jhih-Yi Lin, Yuo-Ju Yen Comments on a Secret-Key-Privacy-Preserving Authentication and Key Agreement Scheme. Search on Bibsonomy ICGEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano Private-Key Hidden Vector Encryption with Key Privacy. Search on Bibsonomy ICTCS The full citation details ... 2009 DBLP  BibTeX  RDF
15Rui Zhang 0002 Acquiring Key Privacy from Data Privacy. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Giuseppe Ateniese, Karyn Benson, Susan Hohenberger Key-Private Proxy Re-encryption. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Byoungcheon Lee Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Unified public key infrastructure, Private key issuing protocol, Key generation and certification authority, Key privacy agent, Certificate-based cryptography, Hybrid cryptography, Bilinear pairing, ID-based cryptography
14Davide Alessio, Marc Joye A simple construction for public-key encryption with revocable anonymity: the honest-sender case. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anonymity, public-key encryption, key-privacy
14Qianhong Wu, Bo Qin, Yi Mu 0001, Willy Susilo Privacy for Private Key in Signatures. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Anonymous identity, Key indistinguishability, Key leakage, Pairing groups, Key privacy, Chosen message attack
14Ryotaro Hayashi 0001, Keisuke Tanaka Anonymity on Paillier's Trap-Door Permutation. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Paillier’s function, Paillier’s trap-door permutation, anonymity, encryption, key-privacy
14Anand Desai The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Hua Guo, Yi Mu 0001, Xiyong Zhang, Zhoujun Li 0001 Server-Controlled Identity-Based Authenticated Key Exchange. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Provable Security, Key Exchange, Identity-based Cryptography
12Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval A Simple Threshold Authenticated Key Exchange from Short Secrets. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Threshold Protocols, Password-based Authentication
11Aggelos Kiayias, Yiannis Tsiounis, Moti Yung Group Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Jinnan Zhang, Zheng Wei, Yang Liu 0003, Qinghua Gong, Xinmin Wang, Min Qiao Verifiable Multi-Key Privacy Data Computing System Based on Blockchain. Search on Bibsonomy ICAIT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Yang Wang, Yanmin Zhao, Mingqiang Wang PREs with HRA Security and Key Privacy Based on Standard LWE Assumptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
10Emmanuel Antwi-Boasiako, Shijie Zhou, Yongjian Liao, Ebenezer Kwaku Danso An LWE-Based Multi-Key Privacy-Preserving Distributed Deep Learning. Search on Bibsonomy HPCC/DSS/SmartCity/DependSys The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
10Ping Li 0018, Jin Li 0002, Zhengan Huang, Tong Li 0011, Chong-Zhi Gao, Siu-Ming Yiu, Kai Chen 0012 Multi-key privacy-preserving deep learning in cloud computing. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
10Yusuke Yoshida, Kirill Morozov, Keisuke Tanaka CCA2 Key-Privacy for Code-Based Encryption in the Standard Model. Search on Bibsonomy PQCrypto The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
10Danilo Gligoroski, Simona Samardjiska Semantic Security and Key-Privacy With Random Split of St-Gen Codes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
10Le Trieu Phong, Lihua Wang 0001, Yoshinori Aono, Manh Ha Nguyen, Xavier Boyen Proxy Re-Encryption Schemes with Key Privacy from LWE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
10Stefan Rass, Raphael Wigoutschnigg Arguable anonymity from key-privacy: The deterministic crowds protocol. Search on Bibsonomy NOMS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
10Danilo Gligoroski, Simona Samardjiska Semantic Security and Key-Privacy with Random Split of St-Gen Codes. Search on Bibsonomy CiE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
10Faezeh Sadat Babamir, Ali Norouzi Achieving Key Privacy and Invisibility for Unattended Wireless Sensor Networks in Healthcare. Search on Bibsonomy Comput. J. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
10Paolo D'Arco, Alfredo De Santis Key privacy and anonymous protocols. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
10Jun Shao 0001, Peng Liu 0005, Yuan Zhou Achieving key privacy without losing CCA security in proxy re-encryption. Search on Bibsonomy J. Syst. Softw. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
10Qiong Huang 0001, Duncan S. Wong, Guomin Yang Heterogeneous Signcryption with Key Privacy. Search on Bibsonomy Comput. J. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
10Chung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, Sherman S. M. Chow An efficient signcryption scheme with key privacy and its extension to ring signcryption. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
10Chik How Tan Analysis of improved signcryption scheme with key privacy. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Jason E. Holt Key Privacy for Identity Based Encryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
10Chik How Tan On the Security of Signcryption Scheme with Key Privacy. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Shai Halevi A sufficient condition for key-privacy. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
10Benoît Libert, Jean-Jacques Quisquater Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Gap Diffie-Hellman groups, provable security, signcryption
10John M. Carroll 0002, P. M. McLelland Fast "infinite-key" privacy transformation for resource-sharing systems. Search on Bibsonomy AFIPS Fall Joint Computing Conference The full citation details ... 1970 DBLP  DOI  BibTeX  RDF
10Michel Abdalla, Malika Izabachène, David Pointcheval Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Dalia Khader Public Key Encryption with Keyword Search Based on K-Resilient IBE. Search on Bibsonomy ICCSA (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Dalia Khader Public Key Encryption with Keyword Search Based on K-Resilient IBE. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
7Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
6Laila El Aimani Anonymity from Public Key Encryption to Undeniable Signatures. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Encryption schemes, KEM/DEM, Convertible undeniable signatures, Anonymity, Generic construction
6Manoj Prabhakaran 0001, Mike Rosulek Rerandomizable RCCA Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #55 of 55 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license