Generalized Selective Decryption (GSD), introduced by Panjwani [TCC’07], is a game for a symmetric encryption scheme Enc that captures the difficulty of proving adaptive security of certain protocols, most notably the Logical Key Hierarchy (LKH) multicast encryption protocol. In the GSD game there are n keys k1,..., kn, which the adversary may adaptively corrupt (learn); moreover, it can ask for encryptions Encki (kj) of keys under other keys. The adversary’s task is to distinguish keys (which it cannot trivially compute) from random. Proving the hardness of GSD assuming only IND-CPA security of Enc is surprisingly hard. Using “complexity leveraging” loses a factor exponential in n, which makes the proof practically meaningless. We can thin...
We have been investigating the cryptographical properties of in nite families of simple graphs of la...
The security of cryptographic primitives and protocols against adversaries that are allowed to make ...
A recent series of works (Hecht, IACR ePrint, 2020–2021) propose to build post-quantum public-key en...
Generalized Selective Decryption (GSD), introduced by Panjwani [TCC’07], is a game for a symmetric e...
Many security definitions come in two flavors: a stronger “adaptive” flavor, where the adversary can...
c © IACR 2015. This article is the final version submitted by the authors to the IACR and to Springe
We construct the first public-key encryption scheme whose chosen-ciphertext (i.e., IND-CCA) security...
We study the following broad question about cryptographic primitives: is it possible to achieve secu...
Abstract. We prove a computational soundness theorem for symmetric-key encryption protocols that can...
Several well-known public key encryption schemes, including those of Alekhnovich (FOCS 2003), Regev ...
Families of edge transitive algebraic graphs defined over finite commutative rings were used for the...
AbstractA new public key cryptosystem was introduced by Wu and Dawson at the Fourth International Co...
© 2018, International Association for Cryptologic Research. We carry out a systematic study of the G...
The security of cryptographic primitives and protocols against adversaries that are allowed to make ...
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we...
We have been investigating the cryptographical properties of in nite families of simple graphs of la...
The security of cryptographic primitives and protocols against adversaries that are allowed to make ...
A recent series of works (Hecht, IACR ePrint, 2020–2021) propose to build post-quantum public-key en...
Generalized Selective Decryption (GSD), introduced by Panjwani [TCC’07], is a game for a symmetric e...
Many security definitions come in two flavors: a stronger “adaptive” flavor, where the adversary can...
c © IACR 2015. This article is the final version submitted by the authors to the IACR and to Springe
We construct the first public-key encryption scheme whose chosen-ciphertext (i.e., IND-CCA) security...
We study the following broad question about cryptographic primitives: is it possible to achieve secu...
Abstract. We prove a computational soundness theorem for symmetric-key encryption protocols that can...
Several well-known public key encryption schemes, including those of Alekhnovich (FOCS 2003), Regev ...
Families of edge transitive algebraic graphs defined over finite commutative rings were used for the...
AbstractA new public key cryptosystem was introduced by Wu and Dawson at the Fourth International Co...
© 2018, International Association for Cryptologic Research. We carry out a systematic study of the G...
The security of cryptographic primitives and protocols against adversaries that are allowed to make ...
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we...
We have been investigating the cryptographical properties of in nite families of simple graphs of la...
The security of cryptographic primitives and protocols against adversaries that are allowed to make ...
A recent series of works (Hecht, IACR ePrint, 2020–2021) propose to build post-quantum public-key en...