![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
How Secure is Deterministic Encryption?
This paper presents three curious findings about deterministic public-key encryption (D-PKE) that further our understanding of its security, in particular because of the contrast with standard, randomized publ...
-
Chapter and Conference Paper
Interactive Message-Locked Encryption and Secure Deduplication
This paper considers the problem of secure storage of outsourced data in a way that permits deduplication. We are for the first time able to provide privacy for messages that are both correlated and dependent ...
-
Chapter and Conference Paper
Cryptography from Compression Functions: The UCE Bridge to the ROM
This paper suggests and explores the use of UCE security for the task of turning VIL-ROM schemes into FIL-ROM ones. The benefits we offer over indifferentiability, the current leading method for this task, are...
-
Chapter and Conference Paper
Instantiating Random Oracles via UCEs
This paper provides a (standard-model) notion of security for (keyed) hash functions, called UCE, that we show enables instantiation of random oracles (ROs) in a fairly broad and systematic way. Goals and sche...
-
Chapter and Conference Paper
Message-Locked Encryption and Secure Deduplication
We formalize a new cryptographic primitive that we call Message-Locked Encryption (MLE), where the key under which encryption and decryption are performed is itself derived from the message. MLE provides a way...