A homomorphic public key cryptography scheme based on the Boolean Satisfiability Problem (SAT) is proposed. The public key is a SAT formula satisfied by the private key. The probabilistic encryption algorithm generates random Boolean functions, which are implied to be false by the public key. Adding the message bits to them yields the cipher functions. A variant of Blum\u27s Hamilton cycle zero-knowledge proof, adapted to SAT, is used to provide an identification and, via a Fiat-Shamir heuristic, a signature scheme. These are conceptually independent from the encryption scheme
At Crypto 2011, some of us had proposed a family of cryptographic protocols for key establishment ca...
NTRUEncrypt, proposed in 1996 by Hoffstein, Pipher and Silverman, is the fastest known lattice-based...
(Sender-)Deniable encryption provides a very strong privacy guarantee: a sender who is coerced by an...
Abstract—A homomorphic public key crypto-scheme based on the Boolean Satisfiability Problem is propo...
International audienceGiven an arbitrary finite nontrivial group, we describe a probabilistic public...
We formalize the notion of a constrained linear trapdoor as an abstract strategy for the generation ...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
Abstract. We solve an open question in code-based cryptography by introducing the first provably sec...
International audienceAt CRYPTO'93, Stern proposed a 3-pass code-based identification scheme with a ...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...
AbstractModern cryptography is based on various building blocks such as one way functions with or wi...
Propositional satisfiability (SAT) is at the nucleus of state-of-the-art approaches to a variety of ...
Encryption schemes often derive their power from the properties of the underlying algebra on the sym...
International audienceWe revisit the problem of proving that a user algorithm se-lected and correctl...
In this thesis we present our contribution in the field of post-quantum cryptography. We introduce a...
At Crypto 2011, some of us had proposed a family of cryptographic protocols for key establishment ca...
NTRUEncrypt, proposed in 1996 by Hoffstein, Pipher and Silverman, is the fastest known lattice-based...
(Sender-)Deniable encryption provides a very strong privacy guarantee: a sender who is coerced by an...
Abstract—A homomorphic public key crypto-scheme based on the Boolean Satisfiability Problem is propo...
International audienceGiven an arbitrary finite nontrivial group, we describe a probabilistic public...
We formalize the notion of a constrained linear trapdoor as an abstract strategy for the generation ...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
Abstract. We solve an open question in code-based cryptography by introducing the first provably sec...
International audienceAt CRYPTO'93, Stern proposed a 3-pass code-based identification scheme with a ...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...
AbstractModern cryptography is based on various building blocks such as one way functions with or wi...
Propositional satisfiability (SAT) is at the nucleus of state-of-the-art approaches to a variety of ...
Encryption schemes often derive their power from the properties of the underlying algebra on the sym...
International audienceWe revisit the problem of proving that a user algorithm se-lected and correctl...
In this thesis we present our contribution in the field of post-quantum cryptography. We introduce a...
At Crypto 2011, some of us had proposed a family of cryptographic protocols for key establishment ca...
NTRUEncrypt, proposed in 1996 by Hoffstein, Pipher and Silverman, is the fastest known lattice-based...
(Sender-)Deniable encryption provides a very strong privacy guarantee: a sender who is coerced by an...