Cryptanalysis of GGH Map, by Yupu Hu and Huiwen Jia
Multilinear map is a novel primitive which has many cryptographic applications, and GGH map is a major candidate of $K$-linear maps for $K>2$. GGH map has two classes of applications, which are...
View ArticleDetecting Mobile Application Spoofing Attacks by Leveraging User Visual...
Mobile application spoofing is an attack where a malicious mobile application mimics the visual appearance of another one. If such an attack is successful, the integrity of what the user sees as well...
View ArticleTrap Me If You Can -- Million Dollar Curve, by Thomas Baignères and Cécile...
A longstanding problem in cryptography is the generation of publicly verifiable randomness. In particular, public verifiability allows to generate parameters for a cryptosystem in a way people can...
View ArticleDowngrade Resilience in Key-Exchange Protocols, by Karthikeyan Bhargavan and...
Key-exchange protocols such as TLS, SSH, IPsec, and ZRTP are highly configurable, with typical deployments supporting multiple protocol versions, cryptographic algorithms and parameters. In the first...
View ArticleMU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing...
Outsourcing data to remote storage servers has become more and more popular, but the related security and privacy concerns have also been raised. To protect the pattern in which a user accesses the...
View ArticleOn the Power of Secure Two-Party Computation, by Carmit Hazay and...
Ishai, Kushilevitz, Ostrovsky and Sahai (STOC`07, SIAM JoC 2009) introduced the powerful ``MPC-in-the-head'' technique that provided a general transformation of information-theoretic MPC protocols...
View ArticleSecure and Oblivious Maximum Bipartite Matching Size Algorithm with...
The increasing availability and use of biometric data for authentication and other purposes leads to situations when sensitive biometric data is to be handled or used in computation by entities who may...
View ArticleHomomorphic Signature Schemes - A survey, by Giulia Traverso and Denise...
Homomorphic signature schemes are an important primitive for many applications and since their introduction numerous solutions have been presented. Thus, in this work we provide the first exhaustive,...
View ArticleWeaknesses in Hadamard Based Symmetric Key Encryption Schemes, by Gajraj...
In this paper security aspects of the existing symmetric key encryption schemes based on Hadamard matrices are examined. Hadamard matrices itself have symmetries like one circulant core or two...
View ArticleNew Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear...
Outsourcing paradigm has become a hot research topic in the cryptography community, where computation workloads can be outsourced to cloud servers by the resource-constrained devices, such as RFID...
View ArticleMultidimensional Meet in the Middle Cryptanalysis of KATAN, by Shahram...
KATAN and KTANTAN are two lightweight families of hardware oriented block ciphers proposed by Canni{\`e}re et al. at CHES 2009. They have different versions of 32-, 48- and 64-bit state, all of which...
View ArticleNon-Interactive Verifiable Secret Sharing For Monotone Circuits, by Ge Bai...
We propose a computationally secure and non-interactive verifiable secret sharing scheme that can be efficiently constructed from any monotone Boolean circuit. By non-interactive we mean that the...
View ArticleProtect both Integrity and Confidentiality in Outsourcing Collaborative...
In the cloud computing era, in order to avoid the computational burdens, many recommendation service providers tend to outsource their collaborative filtering computations to third-party cloud servers....
View ArticleFrom Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour...
We show that a distinguishing attack in the related key model on an Even-Mansour block cipher can readily be converted into an extremely efficient key recovery attack. Concerned ciphers include in...
View ArticleAdaptively Secure Unrestricted Attribute-Based Encryption with Subset...
Providing an efficient revocation mechanism for attribute-based encryption (ABE) is of utmost importance since over time a user's credentials may be revealed or expired. All previously known revocable...
View ArticlePredictable Arguments of Knowledge, by Antonio Faonio and Jesper Buus Nielsen...
We initiate a formal investigation on the power of {\em predictability} for argument of knowledge systems for \NP. Specifically, we consider private-coin argument systems where the answer of the prover...
View ArticleOne-Key Compression Function Based MAC with BBB Security, by Avijit Dutta and...
Ga{\v z}i et al. [CRYPTO 2014] analyzed the NI-MAC construction proposed by An and Bellare [CRYPTO 1999] and gave a tight birthday-bound of $O(lq^{2}/2^{n})$, as an improvement over the previous bound...
View ArticleCryptanalysis of PRINCE with Minimal Data, by Shahram Rasoolzadeh and Håvard...
We investigate two attacks on the PRINCE block cipher in the most realistic scenario, when the attacker only has a minimal amount of known plaintext available. The first attack is called Accelerated...
View ArticleA Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key...
We analyze the handshake protocol of TLS 1.3 draft-ietf-tls-tls13-10 (published October 2015). This continues and extends our previous analysis (CCS 2015, Cryptology ePrint Archive 2015) of former TLS...
View ArticleNon-Interactive Plaintext (In-)Equality Proofs and Group Signatures with...
Group signatures are an important privacy-enhancing tool that allow to anonymously sign messages on behalf of a group. A recent feature for group signatures is controllable linkability, where a...
View Article