Skip to main content

and
  1. Chapter and Conference Paper

    How Secure is Deterministic Encryption?

    This paper presents three curious findings about deterministic public-key encryption (D-PKE) that further our understanding of its security, in particular because of the contrast with standard, randomized publ...

    Mihir Bellare, Rafael Dowsley, Sriram Keelveedhi in Public-Key Cryptography -- PKC 2015 (2015)

  2. Chapter and Conference Paper

    Interactive Message-Locked Encryption and Secure Deduplication

    This paper considers the problem of secure storage of outsourced data in a way that permits deduplication. We are for the first time able to provide privacy for messages that are both correlated and dependent ...

    Mihir Bellare, Sriram Keelveedhi in Public-Key Cryptography -- PKC 2015 (2015)

  3. Chapter and Conference Paper

    Cryptography from Compression Functions: The UCE Bridge to the ROM

    This paper suggests and explores the use of UCE security for the task of turning VIL-ROM schemes into FIL-ROM ones. The benefits we offer over indifferentiability, the current leading method for this task, are...

    Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi in Advances in Cryptology – CRYPTO 2014 (2014)

  4. Chapter and Conference Paper

    Instantiating Random Oracles via UCEs

    This paper provides a (standard-model) notion of security for (keyed) hash functions, called UCE, that we show enables instantiation of random oracles (ROs) in a fairly broad and systematic way. Goals and sche...

    Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi in Advances in Cryptology – CRYPTO 2013 (2013)

  5. Chapter and Conference Paper

    Message-Locked Encryption and Secure Deduplication

    We formalize a new cryptographic primitive that we call Message-Locked Encryption (MLE), where the key under which encryption and decryption are performed is itself derived from the message. MLE provides a way...

    Mihir Bellare, Sriram Keelveedhi in Advances in Cryptology – EUROCRYPT 2013 (2013)

  6. Chapter and Conference Paper

    Authenticated and Misuse-Resistant Encryption of Key-Dependent Data

    This paper provides a comprehensive treatment of the security of authenticated encryption (AE) in the presence of key-dependent data, considering the four variants of the goal arising from the choice of univer...

    Mihir Bellare, Sriram Keelveedhi in Advances in Cryptology – CRYPTO 2011 (2011)