This paper considers arbitrary-length chosen-ciphertext secure asymmetric encryption, thus addressing what is actually needed for a practical usage of strong public-key cryptography in the real world. We put forward two generic constructions, gem-1 and gem-2, which apply to explicit fixed-length weakly secure primitives and provide a strongly secure (IND-CCA2) public-key encryption scheme for messages of unfixed length (typically computer files). Our techniques optimally combine a single call to any one-way trapdoor function with repeated encryptions through some weak block-cipher (a simple xor is fine) and hash functions of fixed-length input so that a minimal number of calls to these functions is needed. Our encryption/decryptio...
Structure-preserving cryptography is a world where messages, signatures, ciphertexts and public keys...
International audienceWe consider designing public-key broadcast encryption schemes with constant-si...
International audienceWe consider designing public-key broadcast encryption schemes with constant-si...
This paper considers arbitrary-length chosen-ciphertext secure asymmetric encryption, thus addressi...
Published in D. Naccache and Pascal Paillier, Eds., Public Key Cryptography, vol. 2274 of Lecture N...
Given an arbitrary k-bit to k-bit trapdoor permutation f and a hash function, we exhibit an encrypti...
Given an arbitrary k-bit to k-bit trapdoor permutation f and a hash function, we exhibit an encrypti...
Abstract. Motivated by the quest for reducing assumptions in security proofs in cryptography, this p...
textabstractEvery public-key encryption scheme has to incorporate a certain amount of randomness int...
Since the appearance of public-key cryptography in Diffie-Hellman seminal paper, many schemes have b...
Abstract. Strong security notions often introduce strong constraints on the construction of cryptogr...
International audienceStructure-preserving cryptography is a world where messages , signatures, ciph...
International audienceStructure-preserving cryptography is a world where messages , signatures, ciph...
International audienceStructure-preserving cryptography is a world where messages , signatures, ciph...
We invesitgate how to construct ciphers which operate on messages of various (and effectively arbitr...
Structure-preserving cryptography is a world where messages, signatures, ciphertexts and public keys...
International audienceWe consider designing public-key broadcast encryption schemes with constant-si...
International audienceWe consider designing public-key broadcast encryption schemes with constant-si...
This paper considers arbitrary-length chosen-ciphertext secure asymmetric encryption, thus addressi...
Published in D. Naccache and Pascal Paillier, Eds., Public Key Cryptography, vol. 2274 of Lecture N...
Given an arbitrary k-bit to k-bit trapdoor permutation f and a hash function, we exhibit an encrypti...
Given an arbitrary k-bit to k-bit trapdoor permutation f and a hash function, we exhibit an encrypti...
Abstract. Motivated by the quest for reducing assumptions in security proofs in cryptography, this p...
textabstractEvery public-key encryption scheme has to incorporate a certain amount of randomness int...
Since the appearance of public-key cryptography in Diffie-Hellman seminal paper, many schemes have b...
Abstract. Strong security notions often introduce strong constraints on the construction of cryptogr...
International audienceStructure-preserving cryptography is a world where messages , signatures, ciph...
International audienceStructure-preserving cryptography is a world where messages , signatures, ciph...
International audienceStructure-preserving cryptography is a world where messages , signatures, ciph...
We invesitgate how to construct ciphers which operate on messages of various (and effectively arbitr...
Structure-preserving cryptography is a world where messages, signatures, ciphertexts and public keys...
International audienceWe consider designing public-key broadcast encryption schemes with constant-si...
International audienceWe consider designing public-key broadcast encryption schemes with constant-si...