Skip to main content

previous disabled Page of 8
and
  1. No Access

    Chapter and Conference Paper

    When Messages Are Keys: Is HMAC a Dual-PRF?

    In Internet security protocols including TLS 1.3, KEMTLS, MLS and Noise, \(\textsf{HMAC}\) HMAC ...

    Matilda Backendal, Mihir Bellare, Felix Günther in Advances in Cryptology – CRYPTO 2023 (2023)

  2. No Access

    Chapter and Conference Paper

    Hardening Signature Schemes via Derive-then-Derandomize: Stronger Security Proofs for EdDSA

    We consider a transform, called Derive-then-Derandomize, that hardens a given signature scheme against randomness failure and implementation error. We prove that it works. We then give a general lemma showing ...

    Mihir Bellare, Hannah Davis, Zi**g Di in Public-Key Cryptography – PKC 2023 (2023)

  3. No Access

    Chapter and Conference Paper

    Flexible Password-Based Encryption: Securing Cloud Storage and Provably Resisting Partitioning-Oracle Attacks

    We introduce flexible password-based encryption (FPBE), an extension of traditional password-based encryption designed to meet the operational and security needs of contemporary applications like end-to-end se...

    Mihir Bellare, Laura Shea in Topics in Cryptology – CT-RSA 2023 (2023)

  4. No Access

    Chapter and Conference Paper

    Efficient Schemes for Committing Authenticated Encryption

    This paper provides efficient authenticated-encryption (AE) schemes in which a ciphertext is a commitment to the key. These are extended, at minimal additional cost, to schemes where the ciphertext is a commit...

    Mihir Bellare, Viet Tung Hoang in Advances in Cryptology – EUROCRYPT 2022 (2022)

  5. No Access

    Chapter and Conference Paper

    Better than Advertised Security for Non-interactive Threshold Signatures

    We give a unified syntax, and a hierarchy of definitions of security of increasing strength, for non-interactive threshold signature schemes. These are schemes having a single-round signing protocol, possibly ...

    Mihir Bellare, Elizabeth Crites, Chelsea Komlo in Advances in Cryptology – CRYPTO 2022 (2022)

  6. No Access

    Chapter and Conference Paper

    Chain Reductions for Multi-signatures and the HBMS Scheme

    Existing proofs for existing Discrete Log (DL) based multi-signature schemes give only weak guarantees if the schemes are implemented, as they are in practice, in 256-bit groups. This is because the underlying...

    Mihir Bellare, Wei Dai in Advances in Cryptology – ASIACRYPT 2021 (2021)

  7. No Access

    Chapter and Conference Paper

    The Multi-Base Discrete Logarithm Problem: Tight Reductions and Non-rewinding Proofs for Schnorr Identification and Signatures

    We introduce the Multi-Base Discrete Logarithm (MBDL) problem. We use this to give reductions, for Schnorr and Okamoto identification and signatures, that are non-rewinding and, by avoiding the notorious squ...

    Mihir Bellare, Wei Dai in Progress in Cryptology – INDOCRYPT 2020 (2020)

  8. No Access

    Chapter and Conference Paper

    Incremental Cryptography Revisited: PRFs, Nonces and Modular Design

    This paper gives the first definitions and constructions for incremental pseudo-random functions (IPRFs). The syntax is nonce based. (Algorithms are deterministic but may take as input a non-repeating quantity...

    Vivek Arte, Mihir Bellare, Louiza Khati in Progress in Cryptology – INDOCRYPT 2020 (2020)

  9. No Access

    Chapter and Conference Paper

    Dual-Mode NIZKs: Possibility and Impossibility Results for Property Transfer

    This paper formulates, and studies, the problem of property transference in dual-mode NIZKs. We say that a property P (such as soundness, ZK or WI) transfers, if, one of the modes having P allows us to prove t...

    Vivek Arte, Mihir Bellare in Progress in Cryptology – INDOCRYPT 2020 (2020)

  10. Chapter and Conference Paper

    Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability

    It is convenient and common for schemes in the random oracle model to assume access to multiple random oracles (ROs), leaving to implementations the task—we call it oracle cloning—of constructing them from a ...

    Mihir Bellare, Hannah Davis, Felix Günther in Advances in Cryptology – EUROCRYPT 2020 (2020)

  11. Chapter and Conference Paper

    Security Under Message-Derived Keys: Signcryption in iMessage

    At the core of Apple’s iMessage is a signcryption scheme that involves symmetric encryption of a message under a key that is derived from the message itself. This motivates us to formalize a primitive we call ...

    Mihir Bellare, Igors Stepanovs in Advances in Cryptology – EUROCRYPT 2020 (2020)

  12. No Access

    Chapter and Conference Paper

    Nonces Are Noticed: AEAD Revisited

    We draw attention to a gap between theory and usage of nonce-based symmetric encryption, under wh...

    Mihir Bellare, Ruth Ng, Björn Tackmann in Advances in Cryptology – CRYPTO 2019 (2019)

  13. No Access

    Chapter and Conference Paper

    The Local Forking Lemma and Its Application to Deterministic Encryption

    We bypass impossibility results for the deterministic encryption of public-key-dependent messages, showing that, in this setting, the classical Encrypt-with-Hash scheme provides message-recovery security, acro...

    Mihir Bellare, Wei Dai, Lucy Li in Advances in Cryptology – ASIACRYPT 2019 (2019)

  14. Article

    Robust Encryption

    We provide a provable-security treatment of “robust” encryption. Robustness means it is hard to produce a ciphertext that is valid for two different users. Robustness makes explicit a property that has been im...

    Michel Abdalla, Mihir Bellare, Gregory Neven in Journal of Cryptology (2018)

  15. Chapter and Conference Paper

    Public-Key Encryption Resistant to Parameter Subversion and Its Realization from Efficiently-Embeddable Groups

    We initiate the study of public-key encryption (PKE) schemes and key-encapsulation mechanisms (KEMs) that retain security even when public parameters (primes, curves) they use may be untrusted and subverted. W...

    Benedikt Auerbach, Mihir Bellare, Eike Kiltz in Public-Key Cryptography – PKC 2018 (2018)

  16. No Access

    Chapter and Conference Paper

    Forward-Security Under Continual Leakage

    Current signature and encryption schemes secure against continual leakage fail completely if the key in any time period is fully exposed. We suggest forward security as a second line of defense, so that in the...

    Mihir Bellare, Adam O’Neill, Igors Stepanovs in Cryptology and Network Security (2018)

  17. No Access

    Chapter and Conference Paper

    The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants

    The Fiat-Shamir paradigm encompasses many different ways of turning a given identification scheme into a signature scheme. Security proofs pertain sometimes to one variant, sometimes to another. We systematica...

    Matilda Backendal, Mihir Bellare, Jessica Sorrell, Jiahao Sun in Secure IT Systems (2018)

  18. Chapter and Conference Paper

    Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures

    We present highly efficient double authentication preventing signatures (DAPS). In a DAPS, signing two messages with the same first part and differing second parts reveals the signing key. In the context of PK...

    Mihir Bellare, Bertram Poettering, Douglas Stebila in Public-Key Cryptography – PKC 2017 (2017)

  19. Chapter and Conference Paper

    Ratcheted Encryption and Key Exchange: The Security of Messaging

    We aim to understand, formalize and provably achieve the goals underlying the core key-ratcheting technique of Borisov, Goldberg and Brewer, extensions of which are now used in secure messaging systems. We giv...

    Mihir Bellare, Asha Camper Singh, Joseph Jaeger in Advances in Cryptology – CRYPTO 2017 (2017)

  20. Chapter and Conference Paper

    The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3

    We initiate the study of multi-user (mu) security of authenticated encryption (AE) schemes as a way to rigorously formulate, and answer, questions about the “randomized nonce” mechanism proposed for the use of...

    Mihir Bellare, Björn Tackmann in Advances in Cryptology – CRYPTO 2016 (2016)

previous disabled Page of 8