
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 111 matches
- 2021
- Rishab Goyal, Jiahui Liu, Brent Waters:
Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups. IACR Cryptol. ePrint Arch. 2021: 343 (2021) - 2020
- Isaac Amankona Obiri
, Qi Xia, Hu Xia, Kwame Opuni-Boachie Obour Agyekum, Kwame Omono Asamoah, Emmanuel Boateng Sifah, Xiaosong Zhang, Jianbin Gao
:
A Fully Secure KP-ABE Scheme on Prime-Order Bilinear Groups through Selective Techniques. Secur. Commun. Networks 2020: 8869057:1-8869057:18 (2020) - Wei Zhang
, Jr-Shin Li
:
Analyzing Controllability of Bilinear Systems on Symmetric Groups: Mapping Lie Brackets to Permutations. IEEE Trans. Autom. Control. 65(11): 4895-4901 (2020) - Xing Wang, Bo Li, Jr-Shin Li, Ian R. Petersen, Guodong Shi:
Controllability over Graphs for Bilinear Systems over Lie Groups. CDC 2020: 5580-5585 - Lu Chi, Zehuan Yuan, Yadong Mu, Changhu Wang:
Non-Local Neural Networks With Grouped Bilinear Attentional Transforms. CVPR 2020: 11801-11810 - Giuseppe Vitto, Alex Biryukov:
Dynamic Universal Accumulator with Batch Update over Bilinear Groups. IACR Cryptol. ePrint Arch. 2020: 777 (2020) - 2019
- Tai Do Duc, Bernhard Schmidt:
Bilinear forms on finite abelian groups and group-invariant Butson Hadamard matrices. J. Comb. Theory, Ser. A 166: 337-351 (2019) - Essam Ghadafi
:
Further Lower Bounds for Structure-Preserving Signatures in Asymmetric Bilinear Groups. AFRICACRYPT 2019: 409-428 - Russell W. F. Lai
, Giulio Malavolta, Viktoria Ronge:
Succinct Arguments for Bilinear Group Arithmetic: Practical Structure-Preserving Cryptography. CCS 2019: 2057-2074 - Russell W. F. Lai, Giulio Malavolta, Viktoria Ronge:
Succinct Arguments for Bilinear Group Arithmetic: Practical Structure-Preserving Cryptography. IACR Cryptol. ePrint Arch. 2019: 969 (2019) - 2018
- Víctor Ayala
, Adriano Da Silva, Max Ferreira:
Affine and bilinear systems on Lie groups. Syst. Control. Lett. 117: 23-29 (2018) - Nuttapong Attrapadung, Goichiro Hanaoka, Shigeo Mitsunari, Yusuke Sakai, Kana Shimizu, Tadanori Teruya:
Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and A Fast Implementation in WebAssembly. AsiaCCS 2018: 685-697 - Essam Ghadafi:
Further Lower Bounds for Structure-Preserving Signatures in Asymmetric Bilinear Groups. IACR Cryptol. ePrint Arch. 2018: 1224 (2018) - 2017
- Takashi Yamakawa
, Shota Yamada
, Goichiro Hanaoka, Noboru Kunihiro
:
Self-Bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications. Algorithmica 79(4): 1286-1317 (2017) - Sivaranjani Reddi, Surekha Borra:
Identity-based Signcryption Groupkey Agreement Protocol Using Bilinear Pairing. Informatica (Slovenia) 41(1) (2017) - Alexei G. Myasnikov, Mahmood Sohrabi:
ω-stability and Morley Rank of Bilinear Maps, Rings and Nilpotent Groups. J. Symb. Log. 82(2): 754-777 (2017) - Gottfried Herold, Max Hoffmann
, Michael Klooß, Carla Ràfols, Andy Rupp:
New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs. CCS 2017: 1547-1564 - Hyang-Sook Lee, Seongan Lim, Ikkwon Yie:
On Pairing Inversion of the Self-bilinear Map on Unknown Order Groups. CSCML 2017: 86-95 - Ayan Mahalanobis, Pralhad Shinde:
Bilinear Cryptography Using Groups of Nilpotency Class 2. IMACC 2017: 127-134 - Hoeteck Wee:
Attribute-Hiding Predicate Encryption in Bilinear Groups, Revisited. TCC (1) 2017: 206-233 - Ayan Mahalanobis, Pralhad Shinde:
Bilinear cryptography using finite p-groups of nilpotency class 2. CoRR abs/1711.07647 (2017) - Gottfried Herold, Max Hoffmann, Michael Klooß, Carla Ràfols, Andy Rupp:
New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs. IACR Cryptol. ePrint Arch. 2017: 802 (2017) - 2016
- Jiafu Yu, Hong Zhong, Yimin Wang:
基于组合阶双线性群的组签名方案的分析与改进 (Correctness Analysis and Improvement of Group Signature in Composite Order Bilinear Groups). 计算机科学 43(2): 179-182 (2016) - Jui-Di Wu, Yuh-Min Tseng, Sen-Shan Huang:
Leakage-resilient ID-based signature scheme in the generic bilinear group model. Secur. Commun. Networks 9(17): 3987-4001 (2016) - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order. AFRICACRYPT 2016: 325-345 - 2015
- Mohamed Belhadj, Julien Salomon, Gabriel Turinici
:
Ensemble controllability and discrimination of perturbed bilinear control systems on connected, simple, compact Lie groups. Eur. J. Control 22: 23-29 (2015) - Jie Zhang
, Futai Zhang:
Information-theoretical secure verifiable secret sharing with vector space access structures over bilinear groups and its applications. Future Gener. Comput. Syst. 52: 109-115 (2015) - Manik Lal Das:
Key-escrow free multi-signature scheme using bilinear pairings. Groups Complex. Cryptol. 7(1): 47-57 (2015) - S. Selva Nidhyananthan
, Prasad M., R. Shantha Selva Kumari
:
Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group. Int. J. Inf. Secur. Priv. 9(4): 1-19 (2015) - Peixin Chen, Xiaofeng Wang, Baokang Zhao, Hao Sun, Jinshu Su
, Ilsun You:
An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite Order Bilinear Groups. BWCCA 2015: 364-369
skipping 81 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2021-04-14 23:18 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint