Sciweavers

ASIACRYPT
2015
Springer
8 years 3 months ago
QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions
Abstract. A sequence of recent works have constructed constant-size quasi-adaptive (QA) NIZK arguments of membership in linear subspaces of ˆGm , where ˆG is a group equipped wit...
Alonso González, Alejandro Hevia, Carla R&a...
ASIACRYPT
2015
Springer
8 years 3 months ago
Type 2 Structure-Preserving Signature Schemes Revisited
At CRYPTO 2014, Abe et al. presented generic-signer structure-preserving signature schemes using Type 2 pairings. According to the authors, the proposed constructions are optimal w...
Sanjit Chatterjee, Alfred Menezes
ASIACRYPT
2015
Springer
8 years 3 months ago
A Framework for Identity-Based Encryption with Almost Tight Security
We show a framework for constructing identity-based encryption (IBE) schemes that are (almost) tightly secure in the multi-challenge and multi-instance setting. In particular, we ...
Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yam...
ASIACRYPT
2015
Springer
8 years 3 months ago
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
Differential and linear cryptanalysis are the general purpose tools to analyze various cryptographic primitives. Both techniques have in common that they rely on the existence of ...
Christoph Dobraunig, Maria Eichlseder, Florian Men...
ASIACRYPT
2015
Springer
8 years 3 months ago
Multi-input Functional Encryption for Unbounded Arity Functions
Saikrishna Badrinarayanan, Divya Gupta 0001, Abhis...
ASIACRYPT
2015
Springer
8 years 3 months ago
Collision Attacks Against CAESAR Candidates - Forgery and Key-Recovery Against AEZ and Marble
In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offset Codebook). These algorithms use secret offsets (masks derived from a whitening key) to...
Thomas Fuhr, Gaëtan Leurent, Valentin Suder
ASIACRYPT
2015
Springer
8 years 3 months ago
Counting Keys in Parallel After a Side Channel Attack
Abstract. Side channels provide additional information to skilled adversaries that reduce the effort to determine an unknown key. If sufficient side channel information is availab...
Daniel P. Martin 0001, Jonathan F. O'Connell, Elis...
ASIACRYPT
2015
Springer
8 years 3 months ago
Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model
We study the adaptive security of constrained PRFs in the standard model. We initiate our exploration with puncturable PRFs. A puncturable PRF family is a special class of constra...
Susan Hohenberger, Venkata Koppula, Brent Waters
ASIACRYPT
2015
Springer
8 years 3 months ago
On Black-Box Complexity of Universally Composable Security in the CRS Model
In this work, we study the intrinsic complexity of black-box Universally Composable (UC) secure computation based on general assumptions. We present a thorough study in various co...
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
ASIACRYPT
2015
Springer
8 years 3 months ago
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
Abstract. We describe three contributions regarding the Soft Analytical Side-Channel Attacks (SASCA) introduced at Asiacrypt 2014. First, we compare them with Algebraic Side-Channe...
Vincent Grosso, François-Xavier Standaert