International audienceGoldwasser and Micali (1984) highlighted the importance of randomizing the plaintext for public-key encryption and introduced the notion of semantic security. They also realized a cryptosystem meeting this security notion under the standard complexity assumption of deciding quadratic residuosity modulo a composite number. The Goldwasser-Micali cryptosystem is simple and elegant but is quite wasteful in bandwidth when encrypting large messages. A number of works followed to address this issue and proposed various modifications. This paper revisits the original Goldwasser-Micali cryptosystem using 2 k-th power residue symbols. The so-obtained cryptosystems appear as a very natural generalization for k ≥ 2 (the case k 1 c...
Abstract. Motivated by the quest for reducing assumptions in security proofs in cryptography, this p...
The paper considers the security of symmetric homomorphic cryptosystems (HC) over the residue ring. ...
Abstract. We present a variant of Regev’s cryptosystem first presented in [Reg05], but with a new ch...
Goldwasser and Micali (J Comput Syst Sci 28(2):270–299, 1984) highlighted the importance of randomiz...
International audienceGoldwasser and Micali (1984) highlighted the importance of randomizing the pla...
We present a novel public key encryption scheme that enables users to exchange many bits messages by...
The $e$-th power residue symbol $\left(\frac{\alpha}{\mathfrak{p}}\right)_e$ is a useful mathematica...
This paper proposes new symmetric cryptoalgorithms of Residue Number System and its Modified Perfect...
This thesis deals with two main matters of modern public key cryptography: provable security and eff...
Cryptography is the art of secret writing. There are essentially two types of cryptosystems. (i) Sec...
A threshold public key encryption protocol is a public key system where the private key is distribut...
Number representation systems establish ways in which numbers are mapped to computer architectures, ...
Abstract: Problem statement: A cryptosystem is a way for a sender and a receiver to communicate digi...
Local pseudorandom generators are a class of fundamental cryptographic primitives having very broad ...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
Abstract. Motivated by the quest for reducing assumptions in security proofs in cryptography, this p...
The paper considers the security of symmetric homomorphic cryptosystems (HC) over the residue ring. ...
Abstract. We present a variant of Regev’s cryptosystem first presented in [Reg05], but with a new ch...
Goldwasser and Micali (J Comput Syst Sci 28(2):270–299, 1984) highlighted the importance of randomiz...
International audienceGoldwasser and Micali (1984) highlighted the importance of randomizing the pla...
We present a novel public key encryption scheme that enables users to exchange many bits messages by...
The $e$-th power residue symbol $\left(\frac{\alpha}{\mathfrak{p}}\right)_e$ is a useful mathematica...
This paper proposes new symmetric cryptoalgorithms of Residue Number System and its Modified Perfect...
This thesis deals with two main matters of modern public key cryptography: provable security and eff...
Cryptography is the art of secret writing. There are essentially two types of cryptosystems. (i) Sec...
A threshold public key encryption protocol is a public key system where the private key is distribut...
Number representation systems establish ways in which numbers are mapped to computer architectures, ...
Abstract: Problem statement: A cryptosystem is a way for a sender and a receiver to communicate digi...
Local pseudorandom generators are a class of fundamental cryptographic primitives having very broad ...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
Abstract. Motivated by the quest for reducing assumptions in security proofs in cryptography, this p...
The paper considers the security of symmetric homomorphic cryptosystems (HC) over the residue ring. ...
Abstract. We present a variant of Regev’s cryptosystem first presented in [Reg05], but with a new ch...