In this paper, we introduce the notion of a Public-Key Encryption (PKE) Scheme that is also a Locally-Decodable Error-Correcting Code. In particular, our construction simultaneously satisfies all of the following properties: • Our Public-Key Encryption is semantically secure under a certain number-theoretic hard-ness assumption (a specific variant of the Φ-hiding assumption). • Our Public-Key Encryption function has constant expansion: it maps plaintexts of length n (for any n polynomial in k, where k is a security parameter) to ciphertexts of size O(n+ k). The size of our Public Key is also linear, O(n+ k). • Our Public-Key Encryption is also a constant rate binary error-correcting code against any polynomial-time Adversary. That is, we al...
Several well-known public key encryption schemes, including those of Alekhnovich (FOCS 2003), Regev ...
We introduce the notion of locally updatable and locally decodable codes (LULDCs). In addition to ha...
We construct a simple public-key encryption scheme that supports polynomially many ad-ditions and on...
In this paper, we introduce the notion of a Public-Key Encryption (PKE) Scheme that is also a Locall...
We consider the problem of constructing efficient locally decodable codes in the presence of a compu...
Abstract. Error correcting codes, though powerful, are only applica-ble in scenarios where the adver...
Abstract McEliece proposed the first public-key cryptosystem based on linear error-correcting codes....
We examine new ways in which coding theory and cryptography continue to be composed together, and sh...
Abstract. We present a new family of linear binary codes of length n and dimension k accompanied wit...
Part 1: Modern CryptographyInternational audienceSide-channel attacks are a major issue for implemen...
One main construct for code-based public key cryptosystems is the McEliece framework that hedges upo...
A public-key cryptosystem, digital signature and authentication procedures based on a Gallager-type...
McEliece cryptosystem is the first public-key cryptosystem based on linear error-correcting codes. A...
We study variants of locally decodable and locally correctable codes in computationally bounded, adv...
The notion of deniable encryption has been known in the literature since its introduction in [1] as ...
Several well-known public key encryption schemes, including those of Alekhnovich (FOCS 2003), Regev ...
We introduce the notion of locally updatable and locally decodable codes (LULDCs). In addition to ha...
We construct a simple public-key encryption scheme that supports polynomially many ad-ditions and on...
In this paper, we introduce the notion of a Public-Key Encryption (PKE) Scheme that is also a Locall...
We consider the problem of constructing efficient locally decodable codes in the presence of a compu...
Abstract. Error correcting codes, though powerful, are only applica-ble in scenarios where the adver...
Abstract McEliece proposed the first public-key cryptosystem based on linear error-correcting codes....
We examine new ways in which coding theory and cryptography continue to be composed together, and sh...
Abstract. We present a new family of linear binary codes of length n and dimension k accompanied wit...
Part 1: Modern CryptographyInternational audienceSide-channel attacks are a major issue for implemen...
One main construct for code-based public key cryptosystems is the McEliece framework that hedges upo...
A public-key cryptosystem, digital signature and authentication procedures based on a Gallager-type...
McEliece cryptosystem is the first public-key cryptosystem based on linear error-correcting codes. A...
We study variants of locally decodable and locally correctable codes in computationally bounded, adv...
The notion of deniable encryption has been known in the literature since its introduction in [1] as ...
Several well-known public key encryption schemes, including those of Alekhnovich (FOCS 2003), Regev ...
We introduce the notion of locally updatable and locally decodable codes (LULDCs). In addition to ha...
We construct a simple public-key encryption scheme that supports polynomially many ad-ditions and on...