International audienceIndistinguishability under chosen-ciphertext attack (IND-CCA) is now considered the de facto security notion for public-key encryption. However, this sometimes offers a stronger security guarantee than what is needed. In this study, the authors consider a weaker security notion, termed as indistinguishability under plaintext-checking attacks (IND-PCA), in which the adversary has only access to an oracle indicating whether or not a given ciphertext encrypts a given message. After formalising this notion, the authors design a new public-key encryption scheme satisfying it. The new scheme is a variant of the Cramer–Shoup encryption scheme with shorter ciphertexts. Its security is also based on the plain decisional Diffie–...
The notion of plaintext awareness ( PA ) has many applications in public key cryptography: it offer...
The notion of plaintext awareness (PA) has many applications in public key cryptography: it offers u...
© International Association for Cryptologic Research 2014. Scenarios in which authenticated encrypti...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
Abstract. Indistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now consid-ered ...
Abstract. In this paper, we propose a simple and efficient password-only authenticated key exchange ...
Abstract. In this paper, we propose a simple and efficient password-only authenticated key exchange ...
In many applications where encrypted traffic flows from an open (public) domain to a protected (priv...
In many applications, where encrypted traffic flows from an open (public) domain to a protected (pri...
textabstractEvery public-key encryption scheme has to incorporate a certain amount of randomness int...
Plaintext checkable encryption (PCE), proposed by Canard et. al., in CT-RSA 2012, is a public-key pr...
International audienceSeveral generic constructions for transforming one-way func-tions to asymmetri...
International audienceSeveral generic constructions for transforming one-way func-tions to asymmetri...
Chosen-ciphertext attacks are typical threat on public-key encryption schemes. We propose a techniqu...
The notion of plaintext awareness ( PA ) has many applications in public key cryptography: it offer...
The notion of plaintext awareness (PA) has many applications in public key cryptography: it offers u...
© International Association for Cryptologic Research 2014. Scenarios in which authenticated encrypti...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
Abstract. Indistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now consid-ered ...
Abstract. In this paper, we propose a simple and efficient password-only authenticated key exchange ...
Abstract. In this paper, we propose a simple and efficient password-only authenticated key exchange ...
In many applications where encrypted traffic flows from an open (public) domain to a protected (priv...
In many applications, where encrypted traffic flows from an open (public) domain to a protected (pri...
textabstractEvery public-key encryption scheme has to incorporate a certain amount of randomness int...
Plaintext checkable encryption (PCE), proposed by Canard et. al., in CT-RSA 2012, is a public-key pr...
International audienceSeveral generic constructions for transforming one-way func-tions to asymmetri...
International audienceSeveral generic constructions for transforming one-way func-tions to asymmetri...
Chosen-ciphertext attacks are typical threat on public-key encryption schemes. We propose a techniqu...
The notion of plaintext awareness ( PA ) has many applications in public key cryptography: it offer...
The notion of plaintext awareness (PA) has many applications in public key cryptography: it offers u...
© International Association for Cryptologic Research 2014. Scenarios in which authenticated encrypti...