© International Association for Cryptologic Research 2014. Scenarios in which authenticated encryption schemes output decrypted plaintext before successful verification raise many security issues. These situations are sometimes unavoidable in practice, such as when devices have insufficient memory to store an entire plaintext, or when a decrypted plaintext needs early processing due to real-time requirements.We introduce the first formalization of the releasing unverified plaintext (RUP) setting. To achieve privacy, we propose using plaintext awareness (PA) along with IND-CPA. An authenticated encryption scheme is PA if it has a plaintext extractor, which tries to fool adversaries by mimicking the decryption oracle, without the secret key. ...
This dissertation studies three cryptographic tools: identification schemes -- collections of algori...
This dissertation studies three cryptographic tools: identification schemes -- collections of algori...
Awareness of the significance of securing communication and data has increased dramatically due to t...
Abstract. Scenarios in which authenticated encryption schemes output decrypted plaintext before succ...
Authenticated encryption schemes are usually expected to offer confidentiality and authenticity. In ...
The notion of plaintext awareness (PA) has many applications in public key cryptography: it offers u...
The notion of plaintext awareness ( PA ) has many applications in public key cryptography: it offer...
International audienceIndistinguishability under chosen-ciphertext attack (IND-CCA) is now considere...
Leakage resilience (LR) and misuse resistance (MR) are two important properties for the deployment o...
International audienceAuthenticated encryption schemes are usually expected to offer confidentiality...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
International audienceWe study the problem of searching on encrypted data, where the search is perfo...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
International audienceWe study the problem of searching on encrypted data, where the search is perfo...
The notion of plaintext awareness (PA) has many applications in public key cryptography: it offers u...
This dissertation studies three cryptographic tools: identification schemes -- collections of algori...
This dissertation studies three cryptographic tools: identification schemes -- collections of algori...
Awareness of the significance of securing communication and data has increased dramatically due to t...
Abstract. Scenarios in which authenticated encryption schemes output decrypted plaintext before succ...
Authenticated encryption schemes are usually expected to offer confidentiality and authenticity. In ...
The notion of plaintext awareness (PA) has many applications in public key cryptography: it offers u...
The notion of plaintext awareness ( PA ) has many applications in public key cryptography: it offer...
International audienceIndistinguishability under chosen-ciphertext attack (IND-CCA) is now considere...
Leakage resilience (LR) and misuse resistance (MR) are two important properties for the deployment o...
International audienceAuthenticated encryption schemes are usually expected to offer confidentiality...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
International audienceWe study the problem of searching on encrypted data, where the search is perfo...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
International audienceWe study the problem of searching on encrypted data, where the search is perfo...
The notion of plaintext awareness (PA) has many applications in public key cryptography: it offers u...
This dissertation studies three cryptographic tools: identification schemes -- collections of algori...
This dissertation studies three cryptographic tools: identification schemes -- collections of algori...
Awareness of the significance of securing communication and data has increased dramatically due to t...