We revisit the notions of robustness introduced by Abdalla, Bellare, and Neven (TCC 2010). One of the main motivations for the introduction of strong robustness for public-key encryption (PKE) by Abdalla et al. to prevent certain types of attack on Sako\u27s auction protocol. We show, perhaps surprisingly, that Sako\u27s protocol is still vulnerable to attacks exploiting robustness problems in the underlying PKE scheme, even when it is instantiated with a \emph{strongly} robust scheme. This demonstrates that current notions of robustness are insufficient even for one of its most natural applications. To address this and other limitations in existing notions, we introduce a series of new robustness notions for PKE and explore their relations...
We study the security of symmetric primitives under the incorrect usage of keys. Roughly speaking, a...
We study the security of symmetric primitives under the incorrect usage of keys. Roughly speaking, a...
Privacy-Preserving Authenticated Key Exchange (PPAKE) provides protection both for the session keys ...
We revisit the notions of robustness introduced by Abdalla, Bellare and Neven (TCC 2010), and relate...
We revisit the notions of robustness introduced by Abdalla, Bellare and Neven (TCC 2010), and relate...
We revisit the notions of robustness introduced by Abdalla, Bellare and Neven (TCC 2010), and relate...
peer reviewedRobustness is a notion often tacitly assumed while working with encrypted data. Roughly...
peer reviewedRobustness is a notion often tacitly assumed while working with encrypted data. Roughly...
International audienceWe provide a provable-security treatment of "robust" encryption. Robustness me...
Robustness is a notion often tacitly assumed while working with encrypted data. Roughly speaking, it...
Robustness is a notion often tacitly assumed while working with encrypted data. Roughly speaking, it...
International audienceRobustness is a notion often tacitly assumed while working with encrypted data...
International audienceRobustness is a notion often tacitly assumed while working with encrypted data...
International audienceWe study the security of symmetric primitives under the incorrect usage of key...
International audienceWe study the security of symmetric primitives under the incorrect usage of key...
We study the security of symmetric primitives under the incorrect usage of keys. Roughly speaking, a...
We study the security of symmetric primitives under the incorrect usage of keys. Roughly speaking, a...
Privacy-Preserving Authenticated Key Exchange (PPAKE) provides protection both for the session keys ...
We revisit the notions of robustness introduced by Abdalla, Bellare and Neven (TCC 2010), and relate...
We revisit the notions of robustness introduced by Abdalla, Bellare and Neven (TCC 2010), and relate...
We revisit the notions of robustness introduced by Abdalla, Bellare and Neven (TCC 2010), and relate...
peer reviewedRobustness is a notion often tacitly assumed while working with encrypted data. Roughly...
peer reviewedRobustness is a notion often tacitly assumed while working with encrypted data. Roughly...
International audienceWe provide a provable-security treatment of "robust" encryption. Robustness me...
Robustness is a notion often tacitly assumed while working with encrypted data. Roughly speaking, it...
Robustness is a notion often tacitly assumed while working with encrypted data. Roughly speaking, it...
International audienceRobustness is a notion often tacitly assumed while working with encrypted data...
International audienceRobustness is a notion often tacitly assumed while working with encrypted data...
International audienceWe study the security of symmetric primitives under the incorrect usage of key...
International audienceWe study the security of symmetric primitives under the incorrect usage of key...
We study the security of symmetric primitives under the incorrect usage of keys. Roughly speaking, a...
We study the security of symmetric primitives under the incorrect usage of keys. Roughly speaking, a...
Privacy-Preserving Authenticated Key Exchange (PPAKE) provides protection both for the session keys ...