We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 8,524 results
  1. Oracle Computability and Turing Reducibility in the Calculus of Inductive Constructions

    We develop synthetic notions of oracle computability and Turing reducibility in the Calculus of Inductive Constructions (CIC), the constructive type...
    Yannick Forster, Dominik Kirst, Niklas Mück in Programming Languages and Systems
    Conference paper 2023
  2. Generic constructions of master-key KDM secure attribute-based encryption

    Master-key key-dependent message (mKDM) security is a strong security notion for attribute-based encryption (ABE) schemes, which has been...

    Jiaxin Pan, Chen Qian, Benedikt Wagner in Designs, Codes and Cryptography
    Article 09 September 2023
  3. Efficient multivariate low-degree tests via interactive oracle proofs of proximity for polynomial codes

    We consider the proximity testing problem for error-correcting codes which consist in evaluations of multivariate polynomials either of bounded...

    Daniel Augot, Sarah Bordage, Jade Nardi in Designs, Codes and Cryptography
    Article 13 November 2022
  4. Simple Constructions from (Almost) Regular One-Way Functions

    Two of the most useful cryptographic primitives that can be constructed from one-way functions are pseudorandom generators (PRGs) and universal...

    Noam Mazor, Jiapeng Zhang in Journal of Cryptology
    Article Open access 30 May 2024
  5. The Pseudorandom Oracle Model and Ideal Obfuscation

    We introduce a new idealized model of hash functions, which we refer to as the pseudorandom oracle (Pr...
    Aayush Jain, Huijia Lin, ... Daniel Wichs in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  6. Non-Observable Quantum Random Oracle Model

    The random oracle model (ROM), introduced by Bellare and Rogaway (CCS 1993), enables a formal security proof for many (efficient) cryptographic...
    Navid Alamati, Varun Maram, Daniel Masny in Post-Quantum Cryptography
    Conference paper 2023
  7. Generic attacks on small-state stream cipher constructions in the multi-user setting

    Small-state stream ciphers (SSCs), which violate the principle that the state size should exceed the key size by a factor of two, still demonstrate...

    Jianfu Huang, Ye Luo, ... Ling Song in Cybersecurity
    Article Open access 08 October 2023
  8. CCA security for contracting (quasi-)Feistel constructions with tight round complexity

    Feistel constructions using contracting round functions were introduced in 1990s and generalized by Yun et al. (Des Codes Cryptogr 58(1):45–72, 2011)...

    Chun Guo, Ling Song in Designs, Codes and Cryptography
    Article 23 March 2024
  9. Lower Bound on SNARGs in the Random Oracle Model

    Succinct non-interactive arguments (SNARGs) have become a fundamental primitive in the cryptographic community. The focus of this work is...
    Iftach Haitner, Daniel Nukrai, Eylon Yogev in Advances in Cryptology – CRYPTO 2022
    Conference paper 2022
  10. Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance

    Suppose we have two hash functions \(h_1\) and...
    Yevgeniy Dodis, Niels Ferguson, ... Krzysztof Pietrzak in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  11. On the Security of Triplex- and Multiplex-Type Constructions with Smaller Tweaks

    In TCHES’22, Shen et al. proposed Triplex, a single-pass leakage-resistant authenticated encryption scheme based on Tweakable Block Ciphers (TBCs)...
    Nilanjan Datta, Avijit Dutta, ... Sougata Mandal in Progress in Cryptology – INDOCRYPT 2023
    Conference paper 2024
  12. Anamorphic Encryption: New Constructions and Homomorphic Realizations

    The elegant paradigm of Anamorphic Encryption (Persiano et al., Eurocrypt 2022) considers the question of establishing a private communication in a...
    Dario Catalano, Emanuele Giunta, Francesco Migliaro in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  13. Selective Opening Security in the Quantum Random Oracle Model, Revisited

    We prove that two variants of the Fujisaki-Okamoto transformations are selective opening (SO) secure against chosen-ciphertext attacks in the quantum...
    Jiaxin Pan, Runzhi Zeng in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  14. Functional signatures: new definition and constructions

    Functional signatures (FS) enable a master authority to delegate its signing privilege to an assistant. Concretely, the master authority uses its...

    Qingwen Guo, Qiong Huang, ... Willy Susilo in Science China Information Sciences
    Article 27 October 2021
  15. Non-uniformity and Quantum Advice in the Quantum Random Oracle Model

    QROM (quantum random oracle model), introduced by Boneh et al. (Asiacrypt 2011), captures all generic algorithms. However, it fails to describe...
    Conference paper 2023
  16. QCCA-Secure Generic Transformations in the Quantum Random Oracle Model

    The post-quantum security of cryptographic schemes assumes that the quantum adversary only receives the classical result of computations with the...
    Tianshu Shan, Jiangxia Ge, Rui Xue in Public-Key Cryptography – PKC 2023
    Conference paper 2023
  17. Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication

    Broadcast Encryption (BE) is public-key encryption allowing a sender to encrypt a message by specifing recipients, and only the specified recipients...

    Hirokazu Kobayashi, Yohei Watanabe, ... Junji Shikata in Designs, Codes and Cryptography
    Article Open access 03 April 2023
  18. Synchronized Aggregate Signature Under Standard Assumption in the Random Oracle Model

    An aggregate signature enables to aggregation of multiple signatures generated by different signers on different messages. A synchronized aggregate...
    R. Kabaleeshwaran, Panuganti Venkata Shanmukh Sai in Progress in Cryptology – INDOCRYPT 2023
    Conference paper 2024
  19. On the (Im)possibility of Time-Lock Puzzles in the Quantum Random Oracle Model

    Time-lock puzzles wrap a solution \(\textrm{s}\)...
    Abtin Afshar, Kai-Min Chung, ... Mohammad Mahmoody in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
Did you find what you were looking for? Share feedback.