International audienceIn a selective-opening chosen ciphertext (SO-CCA) attack on an encryption scheme, an adversary A has access to a decryption oracle, and after getting a number of ciphertexts, can then adaptively corrupt a subset of them, obtaining the plaintexts and corresponding encryption randomness. SO-CCA security requires the privacy of the remaining plaintexts being well protected. There are two flavors of SO-CCA definition: the weaker indistinguishability-based (IND) and the stronger simulation-based (SIM) ones. In this paper, we study SO-CCA secure PKE constructions from all-but-many lossy trapdoor functions (ABM-LTFs) in pairing-friendly prime order groups. Concretely, we construct two ABM-LTFs with O(n/ log λ) size tags for n...
NTRUEncrypt is a fast and practical lattice-based public-key encryption scheme, which has been stand...
Abstract. In AsiaCrypt 2013, Qin and Liu proposed a new approach to CCA-security of Public-Key Encry...
Imagine many small devices send data to a single receiver, encrypted using the receiver's public key...
International audienceIn a selective-opening chosen ciphertext (SO-CCA) attack on an encryption sche...
International audienceSelective opening (SO) security refers to adversaries that receive a number of...
Abstract. We study simulation-based, selective opening security against chosen-ciphertext attacks (S...
Selective opening (SO) security refers to adversaries that receive a number of ciphertexts and, afte...
International audienceSelective opening (SO) security refers to adversaries that receive a number of...
“All-but-many lossy trapdoor functions” (ABM-LTF) are a powerful cryptographic primitive studied by ...
In this paper, we propose the notion of adaptive all-but-one lossy trapdoor functions (aABO-LTFs), a...
textabstractImagine many small devices send data to a single receiver, encrypted using the receiver'...
``All-but-many lossy trapdoor functions\u27\u27 (ABM-LTF) are a powerful cryptographic primitive stu...
Despite having evolved as two distinct research areas, cryptography and coding theory have matured i...
Selective opening (SO) security is a security notion for public-key encryption schemes that captures...
We construct a public-key encryption (PKE) scheme whose security is polynomial-time equivalent to th...
NTRUEncrypt is a fast and practical lattice-based public-key encryption scheme, which has been stand...
Abstract. In AsiaCrypt 2013, Qin and Liu proposed a new approach to CCA-security of Public-Key Encry...
Imagine many small devices send data to a single receiver, encrypted using the receiver's public key...
International audienceIn a selective-opening chosen ciphertext (SO-CCA) attack on an encryption sche...
International audienceSelective opening (SO) security refers to adversaries that receive a number of...
Abstract. We study simulation-based, selective opening security against chosen-ciphertext attacks (S...
Selective opening (SO) security refers to adversaries that receive a number of ciphertexts and, afte...
International audienceSelective opening (SO) security refers to adversaries that receive a number of...
“All-but-many lossy trapdoor functions” (ABM-LTF) are a powerful cryptographic primitive studied by ...
In this paper, we propose the notion of adaptive all-but-one lossy trapdoor functions (aABO-LTFs), a...
textabstractImagine many small devices send data to a single receiver, encrypted using the receiver'...
``All-but-many lossy trapdoor functions\u27\u27 (ABM-LTF) are a powerful cryptographic primitive stu...
Despite having evolved as two distinct research areas, cryptography and coding theory have matured i...
Selective opening (SO) security is a security notion for public-key encryption schemes that captures...
We construct a public-key encryption (PKE) scheme whose security is polynomial-time equivalent to th...
NTRUEncrypt is a fast and practical lattice-based public-key encryption scheme, which has been stand...
Abstract. In AsiaCrypt 2013, Qin and Liu proposed a new approach to CCA-security of Public-Key Encry...
Imagine many small devices send data to a single receiver, encrypted using the receiver's public key...