We construct a public-key encryption (PKE) scheme whose security is polynomial-time equivalent to the hardness of the Subset Sum problem. Our scheme achieves the standard notion of indistinguishability against chosen-ciphertext attacks (IND-CCA) and can be used to encrypt messages of arbitrary polynomial length, improving upon a previous construction by Lyubashevsky, Palacio, and Segev (TCC 2010) which achieved only the weaker notion of semantic security (IND-CPA) and whose concrete security decreases with the length of the message being encrypted. At the core of our construction is a trapdoor technique which originates in the work of Micciancio and Peikert (Eurocrypt 2012)
International audienceSemantic security against chosen-ciphertext attacks (IND-CCA) is widely believ...
We propose a simple and e#cient construction of a CCAsecure public-key encryption scheme from any C...
Abstract. Indistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now consid-ered ...
We construct a public-key encryption (PKE) scheme whose security is polynomial-time equivalent to t...
Abstract. We study simulation-based, selective opening security against chosen-ciphertext attacks (S...
textabstractEvery public-key encryption scheme has to incorporate a certain amount of randomness int...
International audienceIn a selective-opening chosen ciphertext (SO-CCA) attack on an encryption sche...
International audienceIn a selective-opening chosen ciphertext (SO-CCA) attack on an encryption sche...
textabstractImagine many small devices send data to a single receiver, encrypted using the receiver'...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
In SCN12, Nieto et al. discussed an interesting property of public key encryption with chosen cipher...
International audienceIndistinguishability under chosen-ciphertext attack (IND-CCA) is now considere...
Chosen-ciphertext attacks are typical threat on public-key encryption schemes. We propose a techniqu...
We present several new and fairly practical public-key encryption schemes and prove them secure agai...
International audienceSemantic security against chosen-ciphertext attacks (IND-CCA) is widely believ...
We propose a simple and e#cient construction of a CCAsecure public-key encryption scheme from any C...
Abstract. Indistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now consid-ered ...
We construct a public-key encryption (PKE) scheme whose security is polynomial-time equivalent to t...
Abstract. We study simulation-based, selective opening security against chosen-ciphertext attacks (S...
textabstractEvery public-key encryption scheme has to incorporate a certain amount of randomness int...
International audienceIn a selective-opening chosen ciphertext (SO-CCA) attack on an encryption sche...
International audienceIn a selective-opening chosen ciphertext (SO-CCA) attack on an encryption sche...
textabstractImagine many small devices send data to a single receiver, encrypted using the receiver'...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
In SCN12, Nieto et al. discussed an interesting property of public key encryption with chosen cipher...
International audienceIndistinguishability under chosen-ciphertext attack (IND-CCA) is now considere...
Chosen-ciphertext attacks are typical threat on public-key encryption schemes. We propose a techniqu...
We present several new and fairly practical public-key encryption schemes and prove them secure agai...
International audienceSemantic security against chosen-ciphertext attacks (IND-CCA) is widely believ...
We propose a simple and e#cient construction of a CCAsecure public-key encryption scheme from any C...
Abstract. Indistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now consid-ered ...