Hash Proof Systems or Smooth Projective Hash Functions (SPHFs) are a form of implicit arguments introduced by Cramer and Shoup at Eurocrypt’02. They have found many applications since then, in particular for authenticated key exchange or honest-verifier zero-knowledge proofs. While they are relatively well understood in group settings, they seem painful to construct directly in the lattice setting. Only one construction of an SPHF over lattices has been proposed in the standard model, by Katz and Vaikuntanathan at Asiacrypt’09. But this construction has an important drawback: it only works for an ad-hoc language of ciphertexts. Concretely, the corresponding decryption procedure needs to be tweaked, now requiring q many trapdoor inversion at...
Abstract. In this paper we present a general framework for passwordbased authenticated key exchange ...
Lattice-based cryptography is one of the most active research topics in cryptography in recent years...
Abstract. Wepresent new frameworks for constructing public-key encryption schemes satisfying key-dep...
Hash Proof Systems or Smooth Projective Hash Functions (SPHFs) are a form of implicit arguments intr...
Hash Proof Systems or Smooth Projective Hash Functions (SPHFs) are a form of implicit arguments intr...
Abstract. Smooth Projective Hash Functions (SPHFs), also known as Hash Proof Systems, were first int...
Password-authenticated key exchange (PAKE) protocols allow two players to agree on a shared high ent...
Abstract. Password-authenticated key exchange (PAKE) protocols allow two players to agree on a share...
Password-Authenticated Key Exchange (PAKE) has received deep attention in the last few years, with a...
Abstract. Smooth projective hash functions have been used as building block for various cryptographi...
International audienceSmooth projective hashing has proven to be an extremely useful primitive, in p...
Witness encryption (WE) is a recent powerful encryption paradigm, which allows to encrypt a message ...
Smooth projective hashing was firstly introduced by Cramer and Shoup (EuroCrypt\u2702) as a tool to ...
Password-authenticated key exchange (PAKE) protocols allow users sharing a password to agree upon a ...
International audienceAn important problem in secure multi-party computation is the design of protoc...
Abstract. In this paper we present a general framework for passwordbased authenticated key exchange ...
Lattice-based cryptography is one of the most active research topics in cryptography in recent years...
Abstract. Wepresent new frameworks for constructing public-key encryption schemes satisfying key-dep...
Hash Proof Systems or Smooth Projective Hash Functions (SPHFs) are a form of implicit arguments intr...
Hash Proof Systems or Smooth Projective Hash Functions (SPHFs) are a form of implicit arguments intr...
Abstract. Smooth Projective Hash Functions (SPHFs), also known as Hash Proof Systems, were first int...
Password-authenticated key exchange (PAKE) protocols allow two players to agree on a shared high ent...
Abstract. Password-authenticated key exchange (PAKE) protocols allow two players to agree on a share...
Password-Authenticated Key Exchange (PAKE) has received deep attention in the last few years, with a...
Abstract. Smooth projective hash functions have been used as building block for various cryptographi...
International audienceSmooth projective hashing has proven to be an extremely useful primitive, in p...
Witness encryption (WE) is a recent powerful encryption paradigm, which allows to encrypt a message ...
Smooth projective hashing was firstly introduced by Cramer and Shoup (EuroCrypt\u2702) as a tool to ...
Password-authenticated key exchange (PAKE) protocols allow users sharing a password to agree upon a ...
International audienceAn important problem in secure multi-party computation is the design of protoc...
Abstract. In this paper we present a general framework for passwordbased authenticated key exchange ...
Lattice-based cryptography is one of the most active research topics in cryptography in recent years...
Abstract. Wepresent new frameworks for constructing public-key encryption schemes satisfying key-dep...