This paper presents three curious findings about deterministic public-key encryption (D-PKE) that further our understanding of its security, in particular because of the contrast with standard, randomized public-key encryption (R-PKE): • It would appear to be a triviality, for any primitive, that security in the standard model implies security in the random-oracle model, and it is certainly true, and easily proven, for R-PKE. For D-PKE it is not clear and depends on details of the definition. In particular we can show it in the non-uniform case but not in the uniform case. • The power of selective-opening attacks (SOA) comes from an adversary’s ability, upon corrupting a sender, to learn not just the message but also the coins used for encr...
Since the appearance of public-key cryptography in Diffie-Hellman seminal paper, many schemes have b...
In the present work we study provable security in the random oracle model and the standard model usi...
We present efficient constructions of deterministic encryption (DE) satisfying the new notion – secu...
The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO ’07), who p...
Motivated by applications in large storage systems, we initiate the study of incremental determinist...
A cryptographic scheme is \provably secure " if an attack onthescheme implies an attack on ...
Abstract—Provable security is an important issue in modern cryptography because it satisfies the sec...
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO 2007), is...
Public-key encryption (PKE) is a central tool for protecting the privacy of digital information. To ...
We consider the situation for public-key encryption that the adversary knows the randomness which wa...
We show that there is a computational primitive which can be used (in a blackbox manner) to securely...
We compare the relative strengths of popular notions of security for public-key encryption schemes. ...
In this thesis, we analyse the security criteria of some public key encryption schemes. In this resp...
The seminal result of Impagliazzo and Rudich (STOC 1989) gave a black-box separation between one-way...
The security of public-key encryption (PKE), a widely-used cryptographic primitive, has received muc...
Since the appearance of public-key cryptography in Diffie-Hellman seminal paper, many schemes have b...
In the present work we study provable security in the random oracle model and the standard model usi...
We present efficient constructions of deterministic encryption (DE) satisfying the new notion – secu...
The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO ’07), who p...
Motivated by applications in large storage systems, we initiate the study of incremental determinist...
A cryptographic scheme is \provably secure " if an attack onthescheme implies an attack on ...
Abstract—Provable security is an important issue in modern cryptography because it satisfies the sec...
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO 2007), is...
Public-key encryption (PKE) is a central tool for protecting the privacy of digital information. To ...
We consider the situation for public-key encryption that the adversary knows the randomness which wa...
We show that there is a computational primitive which can be used (in a blackbox manner) to securely...
We compare the relative strengths of popular notions of security for public-key encryption schemes. ...
In this thesis, we analyse the security criteria of some public key encryption schemes. In this resp...
The seminal result of Impagliazzo and Rudich (STOC 1989) gave a black-box separation between one-way...
The security of public-key encryption (PKE), a widely-used cryptographic primitive, has received muc...
Since the appearance of public-key cryptography in Diffie-Hellman seminal paper, many schemes have b...
In the present work we study provable security in the random oracle model and the standard model usi...
We present efficient constructions of deterministic encryption (DE) satisfying the new notion – secu...