In this paper we present the first CCA-secure public key encryption scheme that is structure preserving, i.e., our encryption scheme uses only algebraic operations. In particular, it does not use hash-functions or interpret group elements as bit-strings. This makes our scheme a perfect building block for cryptographic protocols where parties for instance want to prove properties about ciphertexts to each other or to jointly compute ciphertexts. Our scheme is very efficient and is secure against adaptive chosen ciphertext attacks. We also provide a few example protocols for which our scheme is useful. For instance, we present an efficient protocol for two parties, Alice and Bob, that allows them to jointly encrypt a given function of their r...
Abstract. The paradigms currently used to realize symmetric encryp-tion schemes secure against adapt...
Abstract. The paradigms currently used to realize symmetric encryp-tion schemes secure against adapt...
A modular approach to constructing cryptographic protocols leads to simple designs but often ineffic...
Abstract. In this paper we present the first CCA-secure public key en-cryption scheme that is struct...
We propose simple and efficient CCA-secure public-key encryption schemes (i.e., schemes secure again...
We propose a simple and e#cient construction of a CCAsecure public-key encryption scheme from any C...
textabstractImagine many small devices send data to a single receiver, encrypted using the receiver'...
Structure-preserving cryptography is a world where messages, signatures, ciphertexts and public keys...
International audienceWe consider designing public-key broadcast encryption schemes with constant-si...
International audienceWe consider designing public-key broadcast encryption schemes with constant-si...
International audienceStructure-preserving cryptography is a world where messages , signatures, ciph...
Abstract. We present a new transformation of chosen-plaintext secure predicate encryption schemes wi...
International audienceStructure-preserving cryptography is a world where messages , signatures, ciph...
International audienceStructure-preserving cryptography is a world where messages , signatures, ciph...
International audienceWe consider designing broadcast encryption schemes with constant-size secret k...
Abstract. The paradigms currently used to realize symmetric encryp-tion schemes secure against adapt...
Abstract. The paradigms currently used to realize symmetric encryp-tion schemes secure against adapt...
A modular approach to constructing cryptographic protocols leads to simple designs but often ineffic...
Abstract. In this paper we present the first CCA-secure public key en-cryption scheme that is struct...
We propose simple and efficient CCA-secure public-key encryption schemes (i.e., schemes secure again...
We propose a simple and e#cient construction of a CCAsecure public-key encryption scheme from any C...
textabstractImagine many small devices send data to a single receiver, encrypted using the receiver'...
Structure-preserving cryptography is a world where messages, signatures, ciphertexts and public keys...
International audienceWe consider designing public-key broadcast encryption schemes with constant-si...
International audienceWe consider designing public-key broadcast encryption schemes with constant-si...
International audienceStructure-preserving cryptography is a world where messages , signatures, ciph...
Abstract. We present a new transformation of chosen-plaintext secure predicate encryption schemes wi...
International audienceStructure-preserving cryptography is a world where messages , signatures, ciph...
International audienceStructure-preserving cryptography is a world where messages , signatures, ciph...
International audienceWe consider designing broadcast encryption schemes with constant-size secret k...
Abstract. The paradigms currently used to realize symmetric encryp-tion schemes secure against adapt...
Abstract. The paradigms currently used to realize symmetric encryp-tion schemes secure against adapt...
A modular approach to constructing cryptographic protocols leads to simple designs but often ineffic...