![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Batch Signatures, Revisited
We revisit batch signatures (previously considered in a draft RFC and used in multiple recent works), where a single, potentially expensive, “inner” digital signature authenticates a Merkle tree constructed fr...
-
Chapter and Conference Paper
SDitH in the QROM
The MPC in the Head (MPCitH) paradigm has recently led to significant improvements for signatures in the code-based setting. In this paper we consider some modifications to a recent twist of MPCitH, called Hyp...
-
Chapter and Conference Paper
The Return of the SDitH
This paper presents a code-based signature scheme based on the well-known syndrome decoding (SD) problem. The scheme builds upon a recent line of research which uses the Multi-Party-Computation-in-the-Head (MP...
-
Chapter and Conference Paper
Towards Automating Cryptographic Hardware Implementations: A Case Study of HQC
While hardware implementations allow the production of highly efficient and performance-oriented designs, exploiting features such as parallelization, their longer time to code and implement often bottlenecks ...
-
Chapter and Conference Paper
LRPC Codes with Multiple Syndromes: Near Ideal-Size KEMs Without Ideals
We introduce a new rank-based key encapsulation mechanism (KEM) with public key and ciphertext sizes around 3.5 Kbytes each, for 128 bits of security, without using ideal structures. Such structures allow to c...
-
Article
Constant Time Algorithms for ROLLO-I-128
In this work, we propose different techniques that can be used to implement the rank-based key encapsulation methods and public key encryption schemes of the ROLLO, and partially RQC, family of algorithms in a...
-
Chapter and Conference Paper
A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib
Fully homomorphic encryption has considerably evolved during the past 10 years. In particular, the discovery of more efficient schemes has brought the computational complexity down to acceptable levels for som...
-
Article
Open AccessEfficient and secure outsourcing of genomic data storage
Cloud computing is becoming the preferred solution for efficiently dealing with the increasing amount of genomic data. Yet, outsourcing storage and processing sensitive information, such as genomic data, comes...
-
Chapter and Conference Paper
Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography
Non-Centered Discrete Gaussian sampling is a fundamental building block in many lattice-based constructions in cryptography, such as signature and identity-based encryption schemes. On the one hand, the center...
-
Chapter and Conference Paper
NFLlib: NTT-Based Fast Lattice Library
Recent years have witnessed an increased interest in lattice cryptography. Besides its strong security guarantees, its simplicity and versatility make this powerful theoretical tool a promising competitive alt...
-
Chapter and Conference Paper
Sealing the Leak on Classical NTRU Signatures
Initial attempts to obtain lattice based signatures were closely related to reducing a vector modulo the fundamental parallelepiped of a secret basis (like GGH [9], or NTRUSign [12]). This approach leaked some in...
-
Chapter and Conference Paper
Adapting Lyubashevsky’s Signature Schemes to the Ring Signature Setting
Basing signature schemes on strong lattice problems has been a long standing open issue. Today, two families of lattice-based signature schemes are known: the ones based on the hash-and-sign construction of Ge...
-
Chapter and Conference Paper
A Code-Based Undeniable Signature Scheme
In this work we propose the first code-based undeniable signature scheme (and more generally the first post-quantum undeniable signature scheme). The verification protocols for our scheme are 3-pass zero-knowl...
-
Chapter
Further Privacy Mechanisms
In general, designing reasonable metrics for privacy quantification is an approach of several disciplines. This section focuses on technical and formal metrics. They can be distinguished depending on purposes ...
-
Chapter and Conference Paper
Additively Homomorphic Encryption with d-Operand Multiplications
The search for encryption schemes that allow to evaluate functions (or circuits) over encrypted data has attracted a lot of attention since the seminal work on this subject by Rivest, Adleman and Dertouzos in ...
-
Chapter and Conference Paper
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
Ring signatures were introduced by Rivest, Shamir and Tauman in 2001. Bresson, Stern and Szydlo extended the ring signature concept to t-out-of-N threshold ring signatures in 2002. We present in this paper a gene...
-
Article
Current and future privacy enhancing technologies for the internet
This paper presents an overview of the current and next solutions for privacy protection on the Internet. We highlight five categories of Privacy Enhancing Technologies (Pets).
-
Chapter and Conference Paper
Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical Databases
This paper presents an overview of the current single-database private information retrieval (PIR) schemes and proposes to explore the usage of these protocols with statistical databases. The vicinity of this ...