Sciweavers

IACR
2016
106views Biometrics» more  IACR 2016»
8 years 7 months ago
Cryptanalysis of the New CLT Multilinear Map over the Integers
Abstract. Multilinear maps serve as a basis for a wide range of cryptographic applications. The first candidate construction of multilinear maps was proposed by Garg, Gentry, and ...
Jung Hee Cheon, Pierre-Alain Fouque, Changmin Lee,...
IACR
2016
61views Biometrics» more  IACR 2016»
8 years 7 months ago
Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption
It is a well-known result that homomorphic encryption is not secure against adaptive chosen ciphertext attacks (CCA2) because of its malleability property. Very recently, however, ...
Hyung Tae Lee, San Ling, Huaxiong Wang
IACR
2016
46views Biometrics» more  IACR 2016»
8 years 7 months ago
The Magic of ELFs
We introduce the notion of an Extremely Lossy Function (ELF). An ELF is a family of functions with an image size that is tunable anywhere from injective to having a polynomial-siz...
Mark Zhandry
IACR
2016
43views Biometrics» more  IACR 2016»
8 years 7 months ago
Interactive Oracle Proofs
We initiate the study of a proof system model that naturally combines two well-known models: interactive proofs (IPs) and probabilistically-checkable proofs (PCPs). An interactive...
Eli Ben-Sasson, Alessandro Chiesa, Nicholas Spoone...
IACR
2016
45views Biometrics» more  IACR 2016»
8 years 7 months ago
Attacks and parameter choices in HIMMO
The HIMMO scheme has been introduced as a lightweight collusion-resistant key pre-distribution scheme, with excellent efficiency in terms of bandwidth, energy consumption and compu...
Oscar García Morchon, Ronald Rietman, Ludo ...
IACR
2016
67views Biometrics» more  IACR 2016»
8 years 7 months ago
Accountable Privacy for Decentralized Anonymous Payments
Decentralized ledger-based currencies such as Bitcoin provide a means to construct payment systems without requiring a trusted bank. Removing this trust assumption comes at the sig...
Christina Garman, Matthew Green 0001, Ian Miers
IACR
2016
41views Biometrics» more  IACR 2016»
8 years 7 months ago
Obfuscation without Multilinear Maps
Known methods for obfuscating a circuit need to represent the circuit as a branching program and then use a multilinear map to encrypt the branching program. Multilinear maps are,...
Dingfeng Ye, Peng Liu
IACR
2016
41views Biometrics» more  IACR 2016»
8 years 7 months ago
Practical backward unlinkable revocation in FIDO, German e-ID, Idemix and U-Prove
Abstract FIDO, German e-ID, Idemix and U-Prove constitute privacyenhanced public-key infrastructures allowing users to authenticate in an anonymous way. This however hampers timely...
Eric R. Verheul
IACR
2016
36views Biometrics» more  IACR 2016»
8 years 7 months ago
Better Preprocessing for Secure Multiparty Computation
We present techniques and protocols for the preprocessing of secure multiparty computation (MPC), focusing on the so-called SPDZ MPC scheme [19] and its derivatives [16,18,1]. Thes...
Carsten Baum, Ivan Damgård, Tomas Toft, Rasm...
IACR
2016
49views Biometrics» more  IACR 2016»
8 years 7 months ago
Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series
Abstract. Since 2012, it is publicly known that the bitstream encryption feature of modern Xilinx FPGAs can be broken by side-channel analysis. Presented at CT-RSA 2012, using grap...
Amir Moradi, Tobias Schneider