{"id":17,"date":"2013-02-26T20:32:40","date_gmt":"2013-02-26T20:32:40","guid":{"rendered":"http:\/\/faculty.engineering.ucdavis.edu\/template\/?page_id=17"},"modified":"2014-08-13T23:55:16","modified_gmt":"2014-08-13T23:55:16","slug":"publications","status":"publish","type":"page","link":"https:\/\/faculty.engineering.ucdavis.edu\/franklin\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<h3><em><\/em>Journal Articles<\/h3>\n<ul>\n<li>J. Hong, J. Kim, J. Kim, M. Franklin, K. Park, Fair threshold decryption\u00a0with semi-trusted third parties, Int. J. Applied Cryptography (2010).<\/li>\n<li>M. Franklin, A survey of key evolving cryptosystems, Int. J. Security and\u00a0Networks 1(2006):46\u201353.<\/li>\n<li>J. Considine, M. Fitzi, M. Franklin, L. Levin, U. Maurer, D. Metcalf, Byzantine \u00a0Agreement given partial broadcast, J. Cryptology 3 (2005):191\u2013217.<\/li>\n<li>M. Franklin, M. Yung, Secure hypergraphs: privacy from partial broadcast,\u00a0SIAM J. Discrete Math 18(2004):437\u2013450.<\/li>\n<li>D. Boneh, M. Franklin, Identity-based encryption from the Weil pairing,\u00a0SIAM J. Computing 32(2003):586\u2013615.<\/li>\n<li>D. Dean, M. Franklin, A. Stubble\ufb01eld, An algebraic approach to IP traceback, ACM Trans. Information and System Security, 5(2002):119\u2013137.<\/li>\n<li>D. Boneh, M. Franklin, E\ufb03cient generation of shared RSA keys, J. ACM,\u00a048(4):702\u2013722, 2001.<\/li>\n<li>M. Franklin, Z. Galil, M. Yung, Eavesdropping games, J. ACM 47(2):225-243, 2000.<\/li>\n<\/ul>\n<h3>Refereed Conference Publications<\/h3>\n<ul>\n<li>Optimal Coding for Streaming Authentication and Interactive Comm,\u00a0Crypto 20113, with R. Gelles, R. Ostrovsky, L. Schulman.<\/li>\n<li>A Framework for Unique Ring Signatures,\u00a0Financial Crypto 2013, with H. Zhang.<\/li>\n<li>Unique Group Signatures,\u00a0ESORICS 2012, with H. Zhang.<\/li>\n<li>Privacy-Preserving Alibi Systems,\u00a0ASIACCS 2012, with H. Chen, B. Davis.<\/li>\n<li>Secure and E\ufb03cient Evaluation of Multivariate Polys and Applications.\u00a0ACNS 2010, with P. Mohassel.<\/li>\n<li>Fair Threshold Decryption with Semi-trusted Third Parties.\u00a0ACISP 2009, with J. Hong, J. Kim, J. Kim, K. Park.<\/li>\n<li>Communication-E\ufb03cient Private Protocols for Longest Common Subsequence.\u00a0RSA-CT 2009, with M. Gondree, P. Mohassel.<\/li>\n<li>Multi-party indirect indexing and applications.\u00a0Asiacrypt 2007, with M. Gondree, P. Mohassel.<\/li>\n<li>Secure linear algebra using linearly recurrent sequences.\u00a0TCC 2007, with E. Kiltz, P. Mohassel, E. Weinreb.<\/li>\n<li>Towards optimal and e\ufb03cient perfectly secure message transmission.\u00a0TCC 2007, with M. Fitzi, J. Garay, S. Harsha Vardhan.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Journal Articles J. Hong, J. Kim, J. Kim, M. Franklin, K. Park, Fair threshold decryption\u00a0with semi-trusted third parties, Int. J. Applied Cryptography (2010). M. Franklin, A survey of key evolving cryptosystems, Int. J. Security and\u00a0Networks 1(2006):46\u201353. J. Considine, M. Fitzi, M. Franklin, L. Levin, U. Maurer, D. Metcalf, Byzantine \u00a0Agreement \u2026 <a class=\"continue-reading-link\" href=\"https:\/\/faculty.engineering.ucdavis.edu\/franklin\/publications\/\"> Continue reading <span class=\"meta-nav\">&rarr; <\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"template-twocolumns-left.php","meta":{"inline_featured_image":false,"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-17","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/faculty.engineering.ucdavis.edu\/franklin\/wp-json\/wp\/v2\/pages\/17","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/faculty.engineering.ucdavis.edu\/franklin\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/faculty.engineering.ucdavis.edu\/franklin\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/faculty.engineering.ucdavis.edu\/franklin\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/faculty.engineering.ucdavis.edu\/franklin\/wp-json\/wp\/v2\/comments?post=17"}],"version-history":[{"count":11,"href":"https:\/\/faculty.engineering.ucdavis.edu\/franklin\/wp-json\/wp\/v2\/pages\/17\/revisions"}],"predecessor-version":[{"id":257,"href":"https:\/\/faculty.engineering.ucdavis.edu\/franklin\/wp-json\/wp\/v2\/pages\/17\/revisions\/257"}],"wp:attachment":[{"href":"https:\/\/faculty.engineering.ucdavis.edu\/franklin\/wp-json\/wp\/v2\/media?parent=17"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}