International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now considered the de facto security notion for public-key encryption. However, the security guarantee that it offers is sometimes stronger than what is needed by certain applications. In this paper, we consider a weaker notion of security for public-key encryption, termed indistinguishability under plaintext-checking attacks (IND-PCA), in which the adversary is only given access to an oracle which says whether or not a given ciphertext encrypts a given message. After formaliz- ing the IND-PCA notion, we then design a new public-key encryption scheme satisfying it. The new scheme is a more efficient variant of the Cramer-Shoup encryption scheme w...
textabstractImagine many small devices send data to a single receiver, encrypted using the receiver'...
We present several new and fairly practical public-key encryption schemes and prove them secure agai...
The notion of plaintext awareness ( PA ) has many applications in public key cryptography: it offer...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
International audienceIndistinguishability under chosen-ciphertext attack (IND-CCA) is now considere...
Abstract. Indistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now consid-ered ...
In many applications where encrypted traffic flows from an open (public) domain to a protected (priv...
In many applications, where encrypted traffic flows from an open (public) domain to a protected (pri...
Abstract. In this paper, we propose a simple and efficient password-only authenticated key exchange ...
Abstract. In this paper, we propose a simple and efficient password-only authenticated key exchange ...
textabstractEvery public-key encryption scheme has to incorporate a certain amount of randomness int...
International audienceSeveral generic constructions for transforming one-way func-tions to asymmetri...
International audienceSeveral generic constructions for transforming one-way func-tions to asymmetri...
Chosen-ciphertext attacks are typical threat on public-key encryption schemes. We propose a techniqu...
International audienceSemantic security against chosen-ciphertext attacks (IND-CCA) is widely believ...
textabstractImagine many small devices send data to a single receiver, encrypted using the receiver'...
We present several new and fairly practical public-key encryption schemes and prove them secure agai...
The notion of plaintext awareness ( PA ) has many applications in public key cryptography: it offer...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
International audienceIndistinguishability under chosen-ciphertext attack (IND-CCA) is now considere...
Abstract. Indistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now consid-ered ...
In many applications where encrypted traffic flows from an open (public) domain to a protected (priv...
In many applications, where encrypted traffic flows from an open (public) domain to a protected (pri...
Abstract. In this paper, we propose a simple and efficient password-only authenticated key exchange ...
Abstract. In this paper, we propose a simple and efficient password-only authenticated key exchange ...
textabstractEvery public-key encryption scheme has to incorporate a certain amount of randomness int...
International audienceSeveral generic constructions for transforming one-way func-tions to asymmetri...
International audienceSeveral generic constructions for transforming one-way func-tions to asymmetri...
Chosen-ciphertext attacks are typical threat on public-key encryption schemes. We propose a techniqu...
International audienceSemantic security against chosen-ciphertext attacks (IND-CCA) is widely believ...
textabstractImagine many small devices send data to a single receiver, encrypted using the receiver'...
We present several new and fairly practical public-key encryption schemes and prove them secure agai...
The notion of plaintext awareness ( PA ) has many applications in public key cryptography: it offer...