Sciweavers

EUROCRYPT
2011
Springer
13 years 3 months ago
Concurrent Composition in the Bounded Quantum Storage Model
We define the BQS-UC model, a variant of the UC model, that deals with protocols in the bounded quantum storage model. We present a statistically secure commitment protocol in th...
Dominique Unruh
EUROCRYPT
2011
Springer
13 years 3 months ago
Unbounded HIBE and Attribute-Based Encryption
In this work, we present HIBE and ABE schemes which are “unbounded” in the sense that the public parameters do not impose additional limitations on the functionality of the sy...
Allison B. Lewko, Brent Waters
EUROCRYPT
2011
Springer
13 years 3 months ago
Semi-homomorphic Encryption and Multiparty Computation
An additively-homomorphic encryption scheme enables us to compute linear functions of an encrypted input by manipulating only the ciphertexts. We define the relaxed notion of a se...
Rikke Bendlin, Ivan Damgård, Claudio Orlandi...
EUROCRYPT
2011
Springer
13 years 3 months ago
Faster Explicit Formulas for Computing Pairings over Ordinary Curves
Abstract. We describe efficient formulas for computing pairings on ordinary elliptic curves over prime fields. First, we generalize lazy reduction techniques, previously considere...
Diego F. Aranha, Koray Karabina, Patrick Longa, Ca...
EUROCRYPT
2011
Springer
13 years 3 months ago
Decentralizing Attribute-Based Encryption
We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority and there is no requirement for any global coordination othe...
Allison B. Lewko, Brent Waters
EUROCRYPT
2011
Springer
13 years 3 months ago
Fully Leakage-Resilient Signatures
Elette Boyle, Gil Segev, Daniel Wichs
EUROCRYPT
2011
Springer
13 years 3 months ago
Statistical Attack on RC4 - Distinguishing WPA
Abstract. In this paper we construct several tools for manipulating pools of biases in the analysis of RC4. Then, we show that optimized strategies can break WEP based on 4000 pack...
Pouyan Sepehrdad, Serge Vaudenay, Martin Vuagnoux
EUROCRYPT
2011
Springer
13 years 3 months ago
Towards a Game Theoretic View of Secure Computation
Gilad Asharov, Ran Canetti, Carmit Hazay
EUROCRYPT
2011
Springer
13 years 3 months ago
Homomorphic Signatures for Polynomial Functions
We construct the first homomorphic signature scheme that is capable of evaluating multivariate polynomials on signed data. Given the public key and a signed data set, there is an...
Dan Boneh, David Mandell Freeman
EUROCRYPT
2011
Springer
13 years 3 months ago
Implementing Gentry's Fully-Homomorphic Encryption Scheme
We describe a working implementation of a variant of Gentry’s fully homomorphic encryption scheme (STOC 2009), similar to the variant used in an earlier implementation effort b...
Craig Gentry, Shai Halevi