In this document, we provide a cryptographic treatment of the adjustable join protocol from CryptDB. We also discuss how our scheme could be used outside of CryptDB because it provides a simple functionality that may be needed in other settings. Intuitively, it is a pseudorandom permutation where an external party not knowing the secret key can nonetheless adjust a ciphertext under one key to a ciphertext under a different key, given an adjustment token from a party that knows the secret key
In this thesis we describe how various rewriting methods in combinatorial group theory can be used t...
As network applications such as electronic commerce proliferate, complex communications protocols th...
AbstractSuppose that two organizations with their own separate cryptosystems are put into a context ...
Database management systems operating over encrypted data are gaining significant commercial interes...
Part 5: Data OutsourcingInternational audienceIn order to perform a join in a deterministically, adj...
Abstract. In order to perform a join in a deterministically, adjustably encrypted database one has t...
This report has two goals. First, we review guidelines for using the CryptDB system [PRZB11, Pop14] ...
International audienceThis study reports on an implementation of cryptographic pairings in a general...
Constructing key-agreement protocols in the random oracle model (ROM) is a viable method to assess t...
In this chapter we introduce the basic building blocks for cryptography based on the discrete logari...
Efficiency is paramount when designing cryptographic protocols, heavy mathematical operations often ...
In this paper we propose a secure protocol for an authenticated key agreement based on the Diffie-He...
We introduce and study a new notion of enhanced chosen-ciphertext security (ECCA) for public-key enc...
International audienceWe analyze the security and the efficiency of interactive protocols where a cl...
En els darrers anys, la criptografia amb corbes el.líptiques ha adquirit una importància creixent, f...
In this thesis we describe how various rewriting methods in combinatorial group theory can be used t...
As network applications such as electronic commerce proliferate, complex communications protocols th...
AbstractSuppose that two organizations with their own separate cryptosystems are put into a context ...
Database management systems operating over encrypted data are gaining significant commercial interes...
Part 5: Data OutsourcingInternational audienceIn order to perform a join in a deterministically, adj...
Abstract. In order to perform a join in a deterministically, adjustably encrypted database one has t...
This report has two goals. First, we review guidelines for using the CryptDB system [PRZB11, Pop14] ...
International audienceThis study reports on an implementation of cryptographic pairings in a general...
Constructing key-agreement protocols in the random oracle model (ROM) is a viable method to assess t...
In this chapter we introduce the basic building blocks for cryptography based on the discrete logari...
Efficiency is paramount when designing cryptographic protocols, heavy mathematical operations often ...
In this paper we propose a secure protocol for an authenticated key agreement based on the Diffie-He...
We introduce and study a new notion of enhanced chosen-ciphertext security (ECCA) for public-key enc...
International audienceWe analyze the security and the efficiency of interactive protocols where a cl...
En els darrers anys, la criptografia amb corbes el.líptiques ha adquirit una importància creixent, f...
In this thesis we describe how various rewriting methods in combinatorial group theory can be used t...
As network applications such as electronic commerce proliferate, complex communications protocols th...
AbstractSuppose that two organizations with their own separate cryptosystems are put into a context ...