Sciweavers

PKC
2016
Springer
73views Cryptology» more  PKC 2016»
10 years 23 days ago
Robust Secret Sharing Schemes Against Local Adversaries
Allison Bishop, Valerio Pastro
PKC
2016
Springer
61views Cryptology» more  PKC 2016»
10 years 23 days ago
Extended Nested Dual System Groups, Revisited
The notion of extended nested dual system groups (ENDSG) was recently proposed by Hofheinz et al. [PKC 2015] for constructing almost-tight identity based encryptions (IBE) in the ...
Junqing Gong, Jie Chen 0021, Xiaolei Dong, Zhenfu ...
PKC
2016
Springer
69views Cryptology» more  PKC 2016»
10 years 23 days ago
On the Hardness of Proving CCA-Security of Signed ElGamal
The well-known Signed ElGamal scheme consists of ElGamal encryption with a non-interactive Schnorr proof of knowledge. While this scheme should be intuitively secure against chosen...
David Bernhard, Marc Fischlin, Bogdan Warinschi
PKC
2016
Springer
69views Cryptology» more  PKC 2016»
10 years 23 days ago
Functional Encryption for Inner Product with Full Function Privacy
Functional encryption (FE) supports constrained decryption keys that allow decrypters to learn specific functions of encrypted messages. In numerous practical applications of FE, ...
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
PKC
2016
Springer
104views Cryptology» more  PKC 2016»
10 years 23 days ago
Non-Malleable Functions and Their Applications
We formally study “non-malleable functions” (NMFs), a general cryptographic primitive which simplifies and relaxes “non-malleable one-way/hash functions” (NMOWHFs) introd...
Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherma...
PKC
2016
Springer
69views Cryptology» more  PKC 2016»
10 years 23 days ago
On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes
We propose generic constructions of public-key encryption schemes, satisfying key-dependent message (KDM) security for projections and different forms of key-leakage resilience, f...
Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Sri...
PKC
2016
Springer
58views Cryptology» more  PKC 2016»
10 years 23 days ago
Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
Key-insulated encryption is one of the effective solutions to a key exposure problem. Recently, identity-based encryption (IBE) has been used as one of fundamental cryptographic p...
Yohei Watanabe, Junji Shikata
PKC
2016
Springer
60views Cryptology» more  PKC 2016»
10 years 23 days ago
Identity-Based Cryptosystems and Quadratic Residuosity
Abstract. Three approaches are currently used for devising identitybased encryption schemes. They respectively build on pairings, quadratic residues (QR), and lattices. Among them,...
Marc Joye
PKC
2016
Springer
79views Cryptology» more  PKC 2016»
10 years 23 days ago
Universally Composable Authentication and Key-Exchange with Global PKI
Message authentication and key exchange are two of the most basic tasks of cryptography. Solutions based on public-key infrastructure (PKI) are prevalent. Still, the state of the ...
Ran Canetti, Daniel Shahaf, Margarita Vald
PKC
2016
Springer
62views Cryptology» more  PKC 2016»
10 years 23 days ago
Mitigating Multi-target Attacks in Hash-Based Signatures
This work introduces XMSS-T, a new stateful hash-based signature scheme with tight security. Previous hash-based signatures are facing a loss of security, linear in performance par...
Andreas Hülsing, Joost Rijneveld, Fang Song 0...