Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
41
views
13
references
Top references
cited by
17
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,955
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Pairing-Based Cryptography – Pairing 2008
Homomorphic Encryption and Signatures from Vector Decomposition
other
Author(s):
Tatsuaki Okamoto
,
Katsuyuki Takashima
Publication date
(Print):
2008
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Vector Biology
Most cited references
13
Record
: found
Abstract
: not found
Book Chapter
: not found
Evaluating 2-DNF Formulas on Ciphertexts
Dan Boneh
,
Eu-Jin Goh
,
Kobbi Nissim
(2005)
0
comments
Cited
139
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
Mihir Bellare
,
Phillip Rogaway
(1996)
0
comments
Cited
77
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
On the Exact Security of Full Domain Hash
Jean-Sébastien Coron
(2000)
0
comments
Cited
36
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Pages
: 57-74
DOI:
10.1007/978-3-540-85538-5_4
SO-VID:
35a43ba1-97a5-4d9d-bad3-a118911fbfcc
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 164
Pairing-Friendly Hyperelliptic Curves with Ordinary Jacobians of Type y 2 = x 5 + ax
pp. 18
Pairing Lattices
pp. 39
The Uber-Assumption Family
pp. 57
Homomorphic Encryption and Signatures from Vector Decomposition
pp. 75
Hidden-Vector Encryption with Groups of Prime Order
pp. 100
Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography
pp. 332
Tracing Malicious Proxies in Proxy Re-encryption
Similar content
2,955
BoostCom: Towards Efficient Universal Fully Homomorphic Encryption by Boosting the Word-wise Comparisons
Authors:
Ardhi Wiratama Baskara Yudha
,
Jiaqi Xue
,
Qian Lou
…
Packed ciphertexts in LWE-based homomorphic encryption
Authors:
Z. Brakerski
,
Z Brakerski
,
C. GENTRY
…
Nearly Ring Homomorphisms and Nearly Ring Derivations on Non-Archimedean Banach Algebras
Authors:
Madjid Eshaghi Gordji
See all similar
Cited by
17
Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
Authors:
Allison Lewko
Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
Authors:
Yannis Rouselakis
,
Brent Waters
Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model
Authors:
Tatsuaki Okamoto
,
Katsuyuki Takashima
See all cited by