We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 119 results
  1. Key-Oblivious Encryption from Isogenies with Application to Accountable Tracing Signatures

    Key-oblivious encryption (KOE) is a promising cryptographic primitive that randomizes the public keys of an encryption scheme in an oblivious manner....
    Surbhi Shaw, Ratna Dutta in Progress in Cryptology – INDOCRYPT 2021
    Conference paper 2021
  2. Traceable Receipt-Free Encryption

    CCA-like game-based security definitions capture confidentiality by asking an adversary to distinguish between honestly computed encryptions of...
    Henri Devillez, Olivier Pereira, Thomas Peters in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
  3. Practical Isogeny-Based Key-Exchange with Optimal Tightness

    We exploit the Diffie-Hellman-like structure of CSIDH to build a quantum-resistant authenticated key-exchange algorithm. Our security proof has...
    Bor de Kock, Kristian Gjøsteen, Mattia Veroni in Selected Areas in Cryptography
    Conference paper 2021
  4. Generic Plaintext Equality and Inequality Proofs

    Given two ciphertexts generated with a public-key encryption scheme, the problem of plaintext equality consists in determining whether the...
    Olivier Blazy, Xavier Bultel, ... Octavio Perez Kempner in Financial Cryptography and Data Security
    Conference paper 2021
  5. Almost Tightly-Secure Re-randomizable and Replayable CCA-Secure Public Key Encryption

    Re-randomizable Replayable CCA-secure public key encryption (Rand-RCCA PKE) schemes guarantee security against chosen-ciphertext attacks while...
    Antonio Faonio, Dennis Hofheinz, Luigi Russo in Public-Key Cryptography – PKC 2023
    Conference paper 2023
  6. New Limits of Provable Security and Applications to ElGamal Encryption

    We provide new results showing that ElGamal encryption cannot be proven CCA1-secure – a long-standing open problem in cryptography. Our result...
    Conference paper 2024
  7. Privacy-Preserving Digital Vaccine Passport

    The global lockdown imposed during the Covid-19 pandemic has resulted in significant social and economic challenges. In an effort to reopen economies...
    Thai Duong, Jiahui Gao, ... Ni Trieu in Cryptology and Network Security
    Conference paper 2023
  8. Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-user Setting: Impossibility Result and Optimal Tightness

    For Key Encapsulation Mechanism (KEM) deployed in a multi-user setting, an adversary may corrupt some users to learn their secret keys, and obtain...
    Shuai Han, Shengli Liu, Dawu Gu in Advances in Cryptology – ASIACRYPT 2021
    Conference paper 2021
  9. Mix-Nets from Re-randomizable and Replayable CCA-Secure Public-Key Encryption

    Mix-nets are protocols that allow a set of senders to send messages anonymously. Faonio et al.  (ASIACRYPT’19) showed how to instantiate mix-net...
    Antonio Faonio, Luigi Russo in Security and Cryptography for Networks
    Conference paper 2022
  10. Scalable Cryptography

    In our modern digital society, cryptography is vital to protect the secrecy and integrity of transmitted and stored information. Settings like...
    Dennis Hofheinz, Eike Kiltz in Algorithms for Big Data
    Chapter Open access 2022
  11. Structure-Preserving and Re-randomizable RCCA-Secure Public Key Encryption and Its Applications

    Re-randomizable RCCA-secure public key encryption (Rand-RCCA PKE) schemes reconcile the property of re-randomizability of the ciphertexts with the...
    Antonio Faonio, Dario Fiore, ... Carla Ràfols in Advances in Cryptology – ASIACRYPT 2019
    Conference paper 2019
  12. Strongly Anonymous Ratcheted Key Exchange

    Anonymity is an (abstract) security goal that is especially important to threatened user groups. Therefore, widely deployed communication protocols...
    Benjamin Dowling, Eduard Hauck, ... Paul Rösler in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
  13. Improving the Efficiency of Re-randomizable and Replayable CCA Secure Public Key Encryption

    Public key encryption schemes that are simultaneously re-randomizable and replayable CCA (Rand-RCCA) secure offer a unique combination of...
    Antonio Faonio, Dario Fiore in Applied Cryptography and Network Security
    Conference paper 2020
  14. On Instantiating Unleveled Fully-Homomorphic Signatures from Falsifiable Assumptions

    We build the first unleveled fully homomorphic signature scheme in the standard model. Our scheme is not constrained by any a-priori bound on the...
    Romain Gay, Bogdan Ursu in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  15. Traceable Constant-Size Multi-authority Credentials

    Many attribute-based anonymous credential (ABC) schemes have been proposed allowing a user to prove the possession of some attributes, anonymously....
    Chloé Hébant, David Pointcheval in Security and Cryptography for Networks
    Conference paper 2022
  16. Practical Round-Optimal Blind Signatures in the ROM from Standard Assumptions

    Blind signatures serve as a foundational tool for privacy-preserving applications and have recently seen renewed interest due to new applications in...
    Shuichi Katsumata, Michael Reichle, Yusuke Sakai in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  17. Powers-of-Tau to the People: Decentralizing Setup Ceremonies

    We propose several decentralized ceremonies for constructing a powers-of-tau structured reference string (SRS). Our protocols make use of a...
    Valeria Nikolaenko, Sam Ragsdale, ... Dan Boneh in Applied Cryptography and Network Security
    Conference paper 2024
  18. On Instantiating the Algebraic Group Model from Falsifiable Assumptions

    We provide a standard-model implementation (of a relaxation) of the algebraic group model (AGM, [Fuchsbauer, Kiltz, Loss, CRYPTO 2018])....
    Thomas Agrikola, Dennis Hofheinz, Julia Kastner in Advances in Cryptology – EUROCRYPT 2020
    Conference paper 2020
  19. On Proving Equivalence Class Signatures Secure from Non-interactive Assumptions

    Equivalence class signatures (EQS), introduced by Hanser and Slamanig (AC’14, J. Crypto’19), sign vectors of elements from a bilinear group. Their...
    Balthazar Bauer, Georg Fuchsbauer, Fabian Regen in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  20. Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable Elections

    We design new encryption mechanisms that enable the design of the first universally verifiable voting schemes, supporting both receipt-freeness and...
    Thi Van Thao Doan, Olivier Pereira, Thomas Peters in Applied Cryptography and Network Security
    Conference paper 2024
Did you find what you were looking for? Share feedback.