Most cryptographic primitives require randomness (for example, to generate secret keys). Usually, one assumes that perfect randomness is available, but, conceivably, such primitives might be built under weaker, more realistic assumptions. This is known to be achievable for many authentication applications, when entropy alone is typically sufficient. In contrast, all known techniques for achieving privacy seem to fundamentally require (nearly) perfect randomness. We ask the question whether this is just a coincidence, or, perhaps, privacy inherently requires true randomness? We completely resolve this question for information-theoretic private-key encryption, where parties wish to encrypt a b-bit value using a shared secret key sampled from ...
A cryptographic scheme is \provably secure " if an attack onthescheme implies an attack on ...
In the bounded-storage model for information-theoretically secure encryption and key-agreement one c...
International audienceWe consider multi-party information-theoretic private protocols, and specifica...
Most cryptographic primitives require randomness (for example, to generate their secret keys). Usual...
Abstract In this work we revisit the question of basing cryptography on imperfect randomness. Bosley...
Abstract. We revisit the impossibility of a variety of cryptographic tasks including privacy and dif...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
Ultrafast physical random bit generation at hundreds of Gb/s rates, with verified randomness, is a c...
The main contribution of this paper is the introduction of a formal notion of public randomness in t...
In this paper, we consider security-privacy issues in authentication techniques based on the extract...
We consider the situation for public-key encryption that the adversary knows the randomness which wa...
AbstractRandomness is a useful computation resource due to its ability to enhance the capabilities o...
Public-key encryption (PKE) is a central tool for protecting the privacy of digital information. To ...
International audienceWe revisit the problem of proving that a user algorithm se-lected and correctl...
Measurements on entangled quantum systems necessarily yield outcomes that are intrinsically unpredic...
A cryptographic scheme is \provably secure " if an attack onthescheme implies an attack on ...
In the bounded-storage model for information-theoretically secure encryption and key-agreement one c...
International audienceWe consider multi-party information-theoretic private protocols, and specifica...
Most cryptographic primitives require randomness (for example, to generate their secret keys). Usual...
Abstract In this work we revisit the question of basing cryptography on imperfect randomness. Bosley...
Abstract. We revisit the impossibility of a variety of cryptographic tasks including privacy and dif...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
Ultrafast physical random bit generation at hundreds of Gb/s rates, with verified randomness, is a c...
The main contribution of this paper is the introduction of a formal notion of public randomness in t...
In this paper, we consider security-privacy issues in authentication techniques based on the extract...
We consider the situation for public-key encryption that the adversary knows the randomness which wa...
AbstractRandomness is a useful computation resource due to its ability to enhance the capabilities o...
Public-key encryption (PKE) is a central tool for protecting the privacy of digital information. To ...
International audienceWe revisit the problem of proving that a user algorithm se-lected and correctl...
Measurements on entangled quantum systems necessarily yield outcomes that are intrinsically unpredic...
A cryptographic scheme is \provably secure " if an attack onthescheme implies an attack on ...
In the bounded-storage model for information-theoretically secure encryption and key-agreement one c...
International audienceWe consider multi-party information-theoretic private protocols, and specifica...