In many applications where encrypted traffic flows from an open (public) domain to a protected (private) domain there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistinguishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can be essentially relaxed to indistinguishability against chosen-plaintext attacks (IND-CPA) for ciphertexts once they pass the gateway that acts as an IND-CCA/CPA filter, by first checking the validity of an incoming IND-CCA ciphertext, then transforming it (if valid) into an IND-CPA ciphertext, and finally forwarding the latter to the recipient in the pr...
International audienceOAEP is a widely used public-key encryption scheme based on trapdoor permutati...
Abstract. At TCC 2005, Backes and Cachin proposed a new and very strong notion of security for publi...
We introduce and study a new notion of enhanced chosen-ciphertext security (ECCA) for public-key enc...
In many applications, where encrypted traffic flows from an open (public) domain to a protected (pri...
In many applications, where encrypted traffic flows from an open (public) domain to a protected (pri...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
International audienceIndistinguishability under chosen-ciphertext attack (IND-CCA) is now considere...
Abstract. Indistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now consid-ered ...
textabstractEvery public-key encryption scheme has to incorporate a certain amount of randomness int...
We introduce and study a new notion of enhanced chosen-ciphertext security (ECCA) for public-key enc...
We propose simple and efficient CCA-secure public-key encryption schemes (i.e., schemes secure again...
textabstractImagine many small devices send data to a single receiver, encrypted using the receiver'...
The notion of plaintext awareness ( PA ) has many applications in public key cryptography: it offer...
International audienceOAEP is a widely used public-key encryption scheme based on trapdoor permutati...
International audienceOAEP is a widely used public-key encryption scheme based on trapdoor permutati...
Abstract. At TCC 2005, Backes and Cachin proposed a new and very strong notion of security for publi...
We introduce and study a new notion of enhanced chosen-ciphertext security (ECCA) for public-key enc...
In many applications, where encrypted traffic flows from an open (public) domain to a protected (pri...
In many applications, where encrypted traffic flows from an open (public) domain to a protected (pri...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
International audienceIndistinguishability under chosen-ciphertext attack (IND-CCA) is now considere...
Abstract. Indistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now consid-ered ...
textabstractEvery public-key encryption scheme has to incorporate a certain amount of randomness int...
We introduce and study a new notion of enhanced chosen-ciphertext security (ECCA) for public-key enc...
We propose simple and efficient CCA-secure public-key encryption schemes (i.e., schemes secure again...
textabstractImagine many small devices send data to a single receiver, encrypted using the receiver'...
The notion of plaintext awareness ( PA ) has many applications in public key cryptography: it offer...
International audienceOAEP is a widely used public-key encryption scheme based on trapdoor permutati...
International audienceOAEP is a widely used public-key encryption scheme based on trapdoor permutati...
Abstract. At TCC 2005, Backes and Cachin proposed a new and very strong notion of security for publi...
We introduce and study a new notion of enhanced chosen-ciphertext security (ECCA) for public-key enc...