Motivated by applications in large storage systems, we initiate the study of incremental deterministic public-key encryption. Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides a realistic alternative to randomized public-key encryption in various scenarios where the latter exhibits inherent drawbacks. A deterministic encryption algorithm, however, cannot satisfy any meaningful notion of security for low-entropy plaintexts distributions, and Bellare et al. demonstrated that a strong notion of security can in fact be realized for relatively high-entropy plaintext distributions. In order to achieve a meaningful level of security, a deterministic encryption algorithm should be typically us...
In this work we study distributed public key schemes secure against continual memory leakage. The se...
The notion of deniable encryption has been known in the literature since its introduction in [1] as ...
The paper proposes a new method for designing deniable encryption protocols characterized in using R...
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO 2007), is...
This paper presents three curious findings about deterministic public-key encryption (D-PKE) that fu...
The problem raised by incremental encryption is the overhead due to the larger storage space require...
The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO ’07), who p...
Bellare, Boldyreva, and O’Neill (CRYPTO ’07) initiated the study of deterministic public-key encrypt...
We present efficient constructions of deterministic encryption (DE) satisfying the new notion – secu...
Abstract. We build on the new security notion for deterministic en-cryption (PRIV) and the PRIV-secu...
In this work we study distributed public key schemes secure against continual memory leakage. The se...
Abstract. Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary w...
We show how to significantly speed-up the encryption portion of some public-key cryptosystems by the...
Even if an encryption algorithm is mathematically strong, humans inevitably make for a weak link in ...
Incompressibility is a popular security notion for white-box cryptography and captures that a large ...
In this work we study distributed public key schemes secure against continual memory leakage. The se...
The notion of deniable encryption has been known in the literature since its introduction in [1] as ...
The paper proposes a new method for designing deniable encryption protocols characterized in using R...
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO 2007), is...
This paper presents three curious findings about deterministic public-key encryption (D-PKE) that fu...
The problem raised by incremental encryption is the overhead due to the larger storage space require...
The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO ’07), who p...
Bellare, Boldyreva, and O’Neill (CRYPTO ’07) initiated the study of deterministic public-key encrypt...
We present efficient constructions of deterministic encryption (DE) satisfying the new notion – secu...
Abstract. We build on the new security notion for deterministic en-cryption (PRIV) and the PRIV-secu...
In this work we study distributed public key schemes secure against continual memory leakage. The se...
Abstract. Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary w...
We show how to significantly speed-up the encryption portion of some public-key cryptosystems by the...
Even if an encryption algorithm is mathematically strong, humans inevitably make for a weak link in ...
Incompressibility is a popular security notion for white-box cryptography and captures that a large ...
In this work we study distributed public key schemes secure against continual memory leakage. The se...
The notion of deniable encryption has been known in the literature since its introduction in [1] as ...
The paper proposes a new method for designing deniable encryption protocols characterized in using R...