We consider the situation for public-key encryption that the adversary knows the randomness which was used to compute the ciphertext. In some practical scenarios, there is a possibility that the randomness is revealed. For example, the randomness used to make a ciphertext may be stored in insecure memory, or the pseudorandom generator may be corrupted. We first formalize the security notion on this situation as “the one-wayness with the randomness revealed.” In addition to the formalization, we focus on two schemes, the generic chosen-ciphertext secure encryption method (GEM) and 3-round OAEP, and prove that these two schemes satisfy our security notions
A cryptographic scheme is \provably secure " if an attack onthescheme implies an attack on ...
International audienceLossy encryption was originally studied as a means of achieving efficient and ...
Abstract: We give a brief introduction to probabilistic encryptions. This serves a
Public-key encryption (PKE) is a central tool for protecting the privacy of digital information. To ...
The main contribution of this paper is the introduction of a formal notion of public randomness in t...
Abstract. Several recent and high-profile incidents give cause to believe that randomness failures o...
Abstract. Chosen-plaintext attacks on private-key encryption schemes are currently modeled by giving...
We give a brief introduction to probabilistic encryptions. This serves as an example how randomness ...
Most cryptographic primitives require randomness (for example, to generate secret keys). Usually, on...
International audienceWe revisit the problem of proving that a user algorithm se-lected and correctl...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
AbstractRandomness is a useful computation resource due to its ability to enhance the capabilities o...
We compare the relative strengths of popular notions of security for public-key encryption schemes. ...
Since the appearance of public-key cryptography in Diffie-Hellman seminal paper, many schemes have b...
Block ciphers are usually based on one top-level scheme into which we plug Âround functionsÂ. To ana...
A cryptographic scheme is \provably secure " if an attack onthescheme implies an attack on ...
International audienceLossy encryption was originally studied as a means of achieving efficient and ...
Abstract: We give a brief introduction to probabilistic encryptions. This serves a
Public-key encryption (PKE) is a central tool for protecting the privacy of digital information. To ...
The main contribution of this paper is the introduction of a formal notion of public randomness in t...
Abstract. Several recent and high-profile incidents give cause to believe that randomness failures o...
Abstract. Chosen-plaintext attacks on private-key encryption schemes are currently modeled by giving...
We give a brief introduction to probabilistic encryptions. This serves as an example how randomness ...
Most cryptographic primitives require randomness (for example, to generate secret keys). Usually, on...
International audienceWe revisit the problem of proving that a user algorithm se-lected and correctl...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
AbstractRandomness is a useful computation resource due to its ability to enhance the capabilities o...
We compare the relative strengths of popular notions of security for public-key encryption schemes. ...
Since the appearance of public-key cryptography in Diffie-Hellman seminal paper, many schemes have b...
Block ciphers are usually based on one top-level scheme into which we plug Âround functionsÂ. To ana...
A cryptographic scheme is \provably secure " if an attack onthescheme implies an attack on ...
International audienceLossy encryption was originally studied as a means of achieving efficient and ...
Abstract: We give a brief introduction to probabilistic encryptions. This serves a