Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
37
views
28
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,601
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computer Security – ESORICS 2016
Efficient Sanitizable Signatures Without Random Oracles
other
Author(s):
Russell W. F. Lai
,
Tao Zhang
,
Sherman S. M. Chow
,
Dominique Schröder
Publication date
(Online):
September 15 2016
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
AIP Publishing: Coronavirus
Most cited references
28
Record
: found
Abstract
: not found
Book Chapter
: not found
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
Ronald Cramer
,
Victor Shoup
(1998)
0
comments
Cited
177
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Efficient Identity-Based Encryption Without Random Oracles
Brent Waters
(2005)
0
comments
Cited
153
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Short Signatures Without Random Oracles
Dan Boneh
,
Xavier Boyen
(2004)
0
comments
Cited
129
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2016
Publication date (Online):
September 15 2016
Pages
: 363-380
DOI:
10.1007/978-3-319-45744-4_18
SO-VID:
777457f0-ebae-40e3-93ce-163726b0ec1d
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution
pp. 27
Toward an Efficient Website Fingerprinting Defense
pp. 47
Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack
pp. 69
Comparing Password Ranking Algorithms on Real-World Password Datasets
pp. 91
Scalable Two-Factor Authentication Using Historical Data
pp. 111
On the Implications of Zipf’s Law in Passwords
pp. 135
PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching
pp. 154
An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries
pp. 173
Efficient Encrypted Keyword Search for Multi-user Data Sharing
pp. 199
Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis
pp. 217
Mobile Application Impersonation Detection Using Dynamic User Interface Extraction
pp. 238
A Machine Learning Approach for Detecting Third-Party Trackers on the Web
pp. 261
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions
pp. 279
Attribute-Based Signatures for Supporting Anonymous Certification
pp. 301
Privacy Preserving Computation in Cloud Using Noise-Free Fully Homomorphic Encryption (FHE) Schemes
pp. 324
Lightweight Delegatable Proofs of Storage
pp. 344
Anonymous RAM
pp. 363
Efficient Sanitizable Signatures Without Random Oracles
pp. 383
Intentio Ex Machina: Android Intent Access Control via an Extensible Application Hook
pp. 401
Hey, You, Get Off of My Image: Detecting Data Residue in Android Images
pp. 422
NaClDroid: Native Code Isolation for Android Applications
pp. 440
AsyncShock: Exploiting Synchronisation Bugs in Intel SGX Enclaves
pp. 458
Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android
pp. 477
Android Permission Recommendation Using Transitive Bayesian Inference Model
pp. 501
Spot the Difference: Secure Multi-execution and Multiple Facets
pp. 520
On Reductions from Multi-Domain Noninterference to the Two-Level Case
pp. 538
Flexible Manipulation of Labeled Values for Information-Flow Control Libraries
pp. 561
Let’s Face It: Faceted Values for Taint Tracking
pp. 581
IFuzzer: An Evolutionary Interpreter Fuzzer Using Genetic Programming
pp. 602
Automated Multi-architectural Discovery of CFI-Resistant Code Gadgets
Similar content
3,601
Production of biofuels and biochemicals: in need of an ORACLE.
Authors:
Ljubiša Mišković
,
Vassily Hatzimanikatis
Compror: On-line lossless data compression with a factor oracle
Authors:
Arnaud Lefebvre
,
Thierry Lecroq
Evolving decision trees using oracle guides
Authors:
Ulf Johansson
,
Lars Niklasson
See all similar
Cited by
2
Chameleon-Hashes with Ephemeral Trapdoors
Authors:
Jan Camenisch
,
David Derler
,
Stephan Krenn
…
Protean Signature Schemes
Authors:
Stephan Krenn
,
Henrich Pohls
,
Kai Samelin
…
See all cited by