In a seminal work, Boneh, Sahai and Waters (BSW) [TCC'11] showed that for functional encryption the indistinguishability notion of security (IND-Security) is weaker than simulation-based security (SIM-Security), and that SIM-Security is in general impossible to achieve. This has opened up the door to a plethora of papers showing feasibility and new impossibility results. Nevertheless, the quest for better definitions that (1) overcome the limitations of IND-Security and (2) the known impossibility results, is still open. In this work, we explore the benefits and the limits of using efficient rewinding black-box simulators to argue security. To do so, we introduce a new simulation-based security definition, that we call rewinding simulation-...
This work furthers the exploration of meaningful definitions for security of Functional Encryption. ...
Functional encryption is an emerging paradigm for public-key encryption that enables fine-grained co...
Password-based Authenticated Key-Exchange (PAKE) protocols allow the establishment of secure communi...
In a seminal work, Boneh, Sahai and Waters (BSW) [TCC'11] showed that for functional encryption the ...
In a seminal work, Boneh, Sahai and Waters (BSW, for short) [TCC’11] showed that for functional encr...
In recent years, there has been great interest in Functional Encryption (FE), a gener-alization of t...
peer reviewedThis work attempts to clarify to what extent simulation-based security (SIM-security) i...
Abstract. We investigate whether security of multiparty computation in the information-theoretic set...
The notion of simulation is central to cryptography: often, to demonstrate that an adversary did not...
One of the main lines of research in functional encryption (FE) has consisted in studying the securi...
International audienceInner product functional encryption (IPFE) [1] is a popular primitive which en...
Ever since the foundational work of Goldwasser and Micali, simulation has proven to be a powerful an...
The introduction of a non-black-box simulation technique by Barak (FOCS 2001) has been a major landm...
Abstract. The introduction of a non-black-box simulation technique by Barak (FOCS 2001) has been a m...
Security models for PAKE protocols aim to capture the desired security properties that such protocol...
This work furthers the exploration of meaningful definitions for security of Functional Encryption. ...
Functional encryption is an emerging paradigm for public-key encryption that enables fine-grained co...
Password-based Authenticated Key-Exchange (PAKE) protocols allow the establishment of secure communi...
In a seminal work, Boneh, Sahai and Waters (BSW) [TCC'11] showed that for functional encryption the ...
In a seminal work, Boneh, Sahai and Waters (BSW, for short) [TCC’11] showed that for functional encr...
In recent years, there has been great interest in Functional Encryption (FE), a gener-alization of t...
peer reviewedThis work attempts to clarify to what extent simulation-based security (SIM-security) i...
Abstract. We investigate whether security of multiparty computation in the information-theoretic set...
The notion of simulation is central to cryptography: often, to demonstrate that an adversary did not...
One of the main lines of research in functional encryption (FE) has consisted in studying the securi...
International audienceInner product functional encryption (IPFE) [1] is a popular primitive which en...
Ever since the foundational work of Goldwasser and Micali, simulation has proven to be a powerful an...
The introduction of a non-black-box simulation technique by Barak (FOCS 2001) has been a major landm...
Abstract. The introduction of a non-black-box simulation technique by Barak (FOCS 2001) has been a m...
Security models for PAKE protocols aim to capture the desired security properties that such protocol...
This work furthers the exploration of meaningful definitions for security of Functional Encryption. ...
Functional encryption is an emerging paradigm for public-key encryption that enables fine-grained co...
Password-based Authenticated Key-Exchange (PAKE) protocols allow the establishment of secure communi...