In this work, we generalize the paradigm of hash proof system (HPS) proposed by Cramer and Shoup [CS02]. In the central of our generalization, we lift subset membership problem to distribution distinguish problem. Our generalized HPS clarifies and encompass all the known public-key encryption (PKE) schemes that essentially implement the idea of hash proof system. Moreover, besides existing smoothness property, we introduce an additional property named anonymity for HPS. As a natural application, we consider anonymity for PKE in the presence of key-leakage, and provide a generic construction of leakage-resilient anonymous PKE from anonymous HPS. We then extend our generalization to the identity-based setting. Concretely, we generalize the pa...
International audienceAn important problem in secure multi-party computation is the design of protoc...
We identify and fill some gaps with regard to consistency (the extent to which false positives are p...
We identify and fill some gaps with regard to consistency (the extent to which false positives are p...
In this paper, we introduce a general paradigm called identity-based extractable hash proof system (...
Anonymity of public key encryption (PKE) requires that, in a multi-user scenario, the PKE ciphertext...
In this paper, we introduce a general paradigm called identity-based extractable hash proof system (...
In this paper, we introduce a general paradigm called identity-based extractable hash proof system (...
In this paper we investigate the topic of integrated public-key encryption (PKE) and public-key encr...
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical...
© International Association for Cryptologic Research 2018. In anonymous identity-based encryption (I...
Efficient and privacy-preserving constructions for search functionality on encrypted data is importa...
Part 1: Modern CryptographyInternational audienceSide-channel attacks are a major issue for implemen...
2019 World Scientific Publishing Company. As the progress of quantum computers, it is desired to pro...
Smooth projective hashing was firstly introduced by Cramer and Shoup (EuroCrypt\u2702) as a tool to ...
As an important primitive, attribute-based encryption (ABE) has attracted much attention in the rela...
International audienceAn important problem in secure multi-party computation is the design of protoc...
We identify and fill some gaps with regard to consistency (the extent to which false positives are p...
We identify and fill some gaps with regard to consistency (the extent to which false positives are p...
In this paper, we introduce a general paradigm called identity-based extractable hash proof system (...
Anonymity of public key encryption (PKE) requires that, in a multi-user scenario, the PKE ciphertext...
In this paper, we introduce a general paradigm called identity-based extractable hash proof system (...
In this paper, we introduce a general paradigm called identity-based extractable hash proof system (...
In this paper we investigate the topic of integrated public-key encryption (PKE) and public-key encr...
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical...
© International Association for Cryptologic Research 2018. In anonymous identity-based encryption (I...
Efficient and privacy-preserving constructions for search functionality on encrypted data is importa...
Part 1: Modern CryptographyInternational audienceSide-channel attacks are a major issue for implemen...
2019 World Scientific Publishing Company. As the progress of quantum computers, it is desired to pro...
Smooth projective hashing was firstly introduced by Cramer and Shoup (EuroCrypt\u2702) as a tool to ...
As an important primitive, attribute-based encryption (ABE) has attracted much attention in the rela...
International audienceAn important problem in secure multi-party computation is the design of protoc...
We identify and fill some gaps with regard to consistency (the extent to which false positives are p...
We identify and fill some gaps with regard to consistency (the extent to which false positives are p...