This paper considers arbitrary-length chosen-ciphertext secure asymmetric encryption, thus addressing what is actually needed for a practical usage of strong public-key cryptography in the real world. We put forward two generic constructions, gem-1 and gem-2, which apply to explicit fixed-length weakly secure primitives and provide a strongly secure (IND-CCA2) public-key encryption scheme for messages of unfixed length (typically computer files). Our techniques optimally combine a single call to any one-way trapdoor function with repeated encryptions through some weak block-cipher (a simple xor is fine) and hash functions of fixed-length input so that a minimal number of calls to these functions is needed. Our encryption/decryptio...
International audienceWe consider designing public-key broadcast encryption schemes with constant-si...
We invesitgate how to construct ciphers which operate on messages of various (and effectively arbitr...
International audienceWe consider designing broadcast encryption schemes with constant-size secret k...
This paper considers arbitrary-length chosen-ciphertext secure asymmetric encryption, thus addressi...
Published in D. Naccache and Pascal Paillier, Eds., Public Key Cryptography, vol. 2274 of Lecture N...
Abstract. Motivated by the quest for reducing assumptions in security proofs in cryptography, this p...
Given an arbitrary k-bit to k-bit trapdoor permutation f and a hash function, we exhibit an encrypti...
Given an arbitrary k-bit to k-bit trapdoor permutation f and a hash function, we exhibit an encrypti...
International audienceStructure-preserving cryptography is a world where messages , signatures, ciph...
International audienceStructure-preserving cryptography is a world where messages , signatures, ciph...
International audienceStructure-preserving cryptography is a world where messages , signatures, ciph...
textabstractEvery public-key encryption scheme has to incorporate a certain amount of randomness int...
Structure-preserving cryptography is a world where messages, signatures, ciphertexts and public keys...
International audienceWe consider designing public-key broadcast encryption schemes with constant-si...
We construct a public-key encryption (PKE) scheme whose security is polynomial-time equivalent to th...
International audienceWe consider designing public-key broadcast encryption schemes with constant-si...
We invesitgate how to construct ciphers which operate on messages of various (and effectively arbitr...
International audienceWe consider designing broadcast encryption schemes with constant-size secret k...
This paper considers arbitrary-length chosen-ciphertext secure asymmetric encryption, thus addressi...
Published in D. Naccache and Pascal Paillier, Eds., Public Key Cryptography, vol. 2274 of Lecture N...
Abstract. Motivated by the quest for reducing assumptions in security proofs in cryptography, this p...
Given an arbitrary k-bit to k-bit trapdoor permutation f and a hash function, we exhibit an encrypti...
Given an arbitrary k-bit to k-bit trapdoor permutation f and a hash function, we exhibit an encrypti...
International audienceStructure-preserving cryptography is a world where messages , signatures, ciph...
International audienceStructure-preserving cryptography is a world where messages , signatures, ciph...
International audienceStructure-preserving cryptography is a world where messages , signatures, ciph...
textabstractEvery public-key encryption scheme has to incorporate a certain amount of randomness int...
Structure-preserving cryptography is a world where messages, signatures, ciphertexts and public keys...
International audienceWe consider designing public-key broadcast encryption schemes with constant-si...
We construct a public-key encryption (PKE) scheme whose security is polynomial-time equivalent to th...
International audienceWe consider designing public-key broadcast encryption schemes with constant-si...
We invesitgate how to construct ciphers which operate on messages of various (and effectively arbitr...
International audienceWe consider designing broadcast encryption schemes with constant-size secret k...