Anonymity of public key encryption (PKE) requires that, in a multi-user scenario, the PKE ciphertexts do not leak information about which public keys are used to generate them. Corruptions are common threats in the multi-user scenario but anonymity of PKE under corruptions is less studied in the literature. In TCC 2020, Benhamouda et al. first provide a formal characterization for anonymity of PKE under a specific type of corruption. However, no known PKE scheme is proved to meet their characterization. To the best of our knowledge, all the PKE application scenarios which require anonymity also require confidentiality. However, in the work by Benhamouda et al., different types of corruptions for anonymity and confidentiality are considered...
The customary formulation of authenticated encryption (AE) requires the decrypting party to supply t...
Kyber is a key-encapsulation mechanism (KEM) that was recently selected by NIST in its PQC standardi...
AbstractIn certificateless cryptography protocol, public keys don’t be required certificates to guar...
In this work, we generalize the paradigm of hash proof system (HPS) proposed by Cramer and Shoup [CS...
In this paper we investigate the topic of integrated public-key encryption (PKE) and public-key encr...
The Naor–Yung paradigm [63] allows to generically boost security under chosen-plaintext attacks (CPA...
In public key encryption (PKE), anonymity is essential to ensure privacy by preventing the ciphertex...
© International Association for Cryptologic Research 2018. In anonymous identity-based encryption (I...
In [3] Al-Riyami and Paterson introduced the notion of Certificateless Public Key Cryptography and...
The security of public-key encryption (PKE), a widely-used cryptographic primitive, has received muc...
There is a vast body of work on {\em implementing} anonymous communication. In this paper, we study ...
As a multi-receiver variant of public key authenticated encryption with keyword search (PAEKS), broa...
In this paper, we study the design of efficient signature and public-key encryption (PKE) schemes in...
PhDThe usual methods of getting anonymity, such as using a VPN or the Tor network, requires some amo...
Public key encryption (PKE) schemes are usually deployed in an open system with numerous users. In p...
The customary formulation of authenticated encryption (AE) requires the decrypting party to supply t...
Kyber is a key-encapsulation mechanism (KEM) that was recently selected by NIST in its PQC standardi...
AbstractIn certificateless cryptography protocol, public keys don’t be required certificates to guar...
In this work, we generalize the paradigm of hash proof system (HPS) proposed by Cramer and Shoup [CS...
In this paper we investigate the topic of integrated public-key encryption (PKE) and public-key encr...
The Naor–Yung paradigm [63] allows to generically boost security under chosen-plaintext attacks (CPA...
In public key encryption (PKE), anonymity is essential to ensure privacy by preventing the ciphertex...
© International Association for Cryptologic Research 2018. In anonymous identity-based encryption (I...
In [3] Al-Riyami and Paterson introduced the notion of Certificateless Public Key Cryptography and...
The security of public-key encryption (PKE), a widely-used cryptographic primitive, has received muc...
There is a vast body of work on {\em implementing} anonymous communication. In this paper, we study ...
As a multi-receiver variant of public key authenticated encryption with keyword search (PAEKS), broa...
In this paper, we study the design of efficient signature and public-key encryption (PKE) schemes in...
PhDThe usual methods of getting anonymity, such as using a VPN or the Tor network, requires some amo...
Public key encryption (PKE) schemes are usually deployed in an open system with numerous users. In p...
The customary formulation of authenticated encryption (AE) requires the decrypting party to supply t...
Kyber is a key-encapsulation mechanism (KEM) that was recently selected by NIST in its PQC standardi...
AbstractIn certificateless cryptography protocol, public keys don’t be required certificates to guar...