Sciweavers

PKC
2015
Springer
16views Cryptology» more  PKC 2015»
8 years 6 months ago
Simple Functional Encryption Schemes for Inner Products
Functional encryption is a new paradigm that allows users to finely control the amount of information that is revealed by a ciphertext to a given receiver. Recent papers have foc...
Michel Abdalla, Florian Bourse, Angelo De Caro, Da...
PKC
2015
Springer
19views Cryptology» more  PKC 2015»
8 years 6 months ago
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds
Recent work on structure-preserving signatures studies optimality of these schemes in terms of the number of group elements needed in the verification key and the signature, and t...
Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andr...
PKC
2015
Springer
13views Cryptology» more  PKC 2015»
8 years 6 months ago
Interactive Message-Locked Encryption and Secure Deduplication
This paper considers the problem of secure storage of outsourced data in a way that permits deduplication. We are for the first time able to provide privacy for messages that are...
Mihir Bellare, Sriram Keelveedhi
PKC
2015
Springer
14views Cryptology» more  PKC 2015»
8 years 6 months ago
How Secure is Deterministic Encryption?
Mihir Bellare, Rafael Dowsley, Sriram Keelveedhi
PKC
2015
Springer
10views Cryptology» more  PKC 2015»
8 years 6 months ago
On the Selective Opening Security of Practical Public-Key Encryption Schemes
We show that two well-known and widely employed public-key encryption schemes – RSA Optimal Asymmetric Encryption Padding (RSA-OAEP) and Diffie-Hellman Integrated Encryption Sch...
Felix Heuer, Tibor Jager, Eike Kiltz, Sven Sch&aum...
PKC
2015
Springer
19views Cryptology» more  PKC 2015»
8 years 6 months ago
Divisible E-Cash Made Practical
the Full Version of the Extended Abstract that appears in the Proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography (PKC ’15) (30 Mar...
Sébastien Canard, David Pointcheval, Olivie...
PKC
2015
Springer
19views Cryptology» more  PKC 2015»
8 years 6 months ago
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security
Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. ...
PKC
2015
Springer
17views Cryptology» more  PKC 2015»
8 years 6 months ago
Adaptive Proofs of Knowledge in the Random Oracle Model
We formalise the notion of adaptive proofs of knowledge in the random oracle model, where the extractor has to recover witnesses for multiple, possibly adaptively chosen statements...
David Bernhard, Marc Fischlin, Bogdan Warinschi
PKC
2015
Springer
27views Cryptology» more  PKC 2015»
8 years 6 months ago
Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
We study simulation-based, selective opening security against chosen-ciphertext attacks (SIM-SO-CCA security) for public key encryption (PKE). In a selective opening, chosen-cipher...
Shengli Liu, Kenneth G. Paterson
PKC
2015
Springer
30views Cryptology» more  PKC 2015»
8 years 6 months ago
Additively Homomorphic UC Commitments with Optimal Amortized Overhead
We propose the first UC secure commitment scheme with (amortized) computational complexity linear in the size of the string committed to. After a preprocessing phase based on obli...
Ignacio Cascudo, Ivan Damgård, Bernardo Mach...