Sciweavers

PKC
2015
Springer
21views Cryptology» more  PKC 2015»
8 years 3 months ago
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
Abstract. We investigate the security of the family of MQQ public key cryptosystems using multivariate quadratic quasigroups (MQQ). These cryptosystems show especially good perform...
Jean-Charles Faugère, Danilo Gligoroski, Lu...
PKC
2015
Springer
7views Cryptology» more  PKC 2015»
8 years 3 months ago
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based
We introduce a lattice-based group signature scheme that provides several noticeable improvements over the contemporary ones: simpler construction, weaker hardness assumptions, and...
San Ling, Khoa Nguyen, Huaxiong Wang
PKC
2015
Springer
6views Cryptology» more  PKC 2015»
8 years 3 months ago
Tightly-Secure Signatures from Chameleon Hash Functions
Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin ...
PKC
2015
Springer
9views Cryptology» more  PKC 2015»
8 years 3 months ago
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
We construct an identity-based encryption (IBE) scheme that is tightly secure in a very strong sense. Specifically, we consider a setting with many instances of the scheme and ma...
Dennis Hofheinz, Jessica Koch, Christoph Striecks
PKC
2015
Springer
7views Cryptology» more  PKC 2015»
8 years 3 months ago
A Tamper and Leakage Resilient von Neumann Architecture
An extended abstract of this paper is published in the proceedings of the 18th International Conference on Practice and Theory of Public-Key Cryptography—PKC 2015. This is the fu...
Sebastian Faust, Pratyay Mukherjee, Jesper Buus Ni...
PKC
2015
Springer
29views Cryptology» more  PKC 2015»
8 years 3 months ago
Anonymous Transferable E-Cash
Cryptographic e-cash allows off-line electronic transactions between a bank, users and merchants in a secure and anonymous fashion. A plethora of e-cash constructions has been pro...
Foteini Baldimtsi, Melissa Chase, Georg Fuchsbauer...
PKC
2015
Springer
9views Cryptology» more  PKC 2015»
8 years 3 months ago
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks
Michel Abdalla, Fabrice Benhamouda, David Pointche...
PKC
2015
Springer
11views Cryptology» more  PKC 2015»
8 years 3 months ago
Simple Lattice Trapdoor Sampling from a Broad Class of Distributions
Vadim Lyubashevsky, Daniel Wichs
PKC
2015
Springer
18views Cryptology» more  PKC 2015»
8 years 3 months ago
On the Practical Security of Inner Product Functional Encryption
Functional Encryption (FE) is an exciting new paradigm that extends the notion of public key encryption. In this work we explore the security of Inner Product Functional Encryptio...
Shashank Agrawal, Shweta Agrawal, Saikrishna Badri...