Indistinguishability Obfuscation from Semantically-Secure Multilinear...
We define a notion of semantic security of multilinear (a.k.a. graded) encoding schemes, which generalizes a multilinear DDH assumption: roughly speaking, we require that if two constant-length...
View ArticleA Second Look at Fischlin's Transformation, by Özgür Dagdelen and Daniele...
Fischlin's transformation is an alternative to the standard Fiat-Shamir transform to turn a certain class of public key identification schemes into digital signatures (in the random oracle model). We...
View ArticlePractical Receipt-Free Sealed-Bid Auction in the Coercive Environment, by...
Sealed-Bid auction is an efficient and rational method to establish the price in open market. However sealed-bid auctions are sub- ject to bid-rigging attack. Receipt-free mechanisms were proposed to...
View ArticleThe Temperature Side Channel and Heating Fault Attacks, by Michael Hutter and...
In this paper, we present practical results of data leakages of CMOS devices via the temperature side channel---a side channel that has been widely cited in literature but not well characterized yet....
View ArticleSide-Channel Analysis on Blinded Regular Scalar Multiplications, by Benoit...
We present a new side-channel attack path threatening state-of-the-art protected implementations of elliptic curves embedded scalar multiplications. Regular algorithms such as the double-and-add-always...
View ArticleTwo-sources Randomness Extractors for Elliptic Curves, by Abdoul Aziz Ciss
This paper studies the task of two-sources randomness extractors for elliptic curves defined over finite fields $K$, where $K$ can be a prime or a binary field. In fact, we introduce new constructions...
View ArticleA New Object Searching Protocol for Multi-tag RFID, by Subhasish Dhal and...
Searching an object from a large set is a tedious task. Radio Frequency IDentification (RFID) technology helps us to search the desired object efficiently. In this technology, a small chip called RFID...
View ArticleA Comparison of the Homomorphic Encryption Schemes FV and YASHE, by Tancrède...
We conduct a theoretical and practical comparison of two Ring-LWE-based, scale-invariant, leveled homomorphic encryption schemes - Fan and Vercauteren's adaptation of BGV and the YASHE scheme proposed...
View ArticleJHAE: An Authenticated Encryption Mode Based on JH, by Javad Alizadeh,...
In this paper we present JHAE, an authenticated encryption (AE) mode based on the JH hash mode. JHAE is a dedicated AE mode based on permutation. We prove that this mode, based on ideal permutation, is...
View ArticleCryptanalysis and Security Enhancement of Two Advanced Authentication...
In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Jiang et al., is a password-based authentication scheme which does not use smart cards. We...
View ArticleLow Overhead Broadcast Encryption from Multilinear Maps, by Dan Boneh and...
We use multilinear maps to provide a solution to the long-standing problem of public-key broadcast encryption where all parameters in the system are small. In our constructions, ciphertext overhead,...
View ArticleQuantum algorithms to check Resiliency, Symmetry and Linearity of a Boolean...
In this paper, we present related quantum algorithms to check the order of resiliency, symmetry and linearity of a Boolean function that is available as a black-box (oracle). First we consider...
View ArticleCrypto-Multimedia, by Benlcouiri Younes and Azizi Abdelmalek and Moulay Chrif...
This paper is structured on securing of storage, transmission and the traceability of digital images. It consists in the design of the cryptographic algorithms appropriate to the case of fixed and...
View ArticleBreaking POET Authentication with a Single Query, by Jian Guo and Jérémy Jean...
In this short article, we describe a very practical and simple attack on the authentication part of POET authenticated encryption mode proposed at FSE 2014. POET is a provably secure scheme that was...
View ArticleFast GPGPU-Based Elliptic Curve Scalar Multiplication, by Eric M. Mahé and...
This paper presents a fast implementation to compute the scalar multiplication of elliptic curve points based on a ``General-Purpose computing on Graphics Processing Units'' (GPGPU) approach. A GPU...
View ArticleDoubly Spatial Encryption from DBDH, by Jie Chen and Hoeteck Wee
Functional encryption is an emerging paradigm for public-key encryption which enables fine-grained control of access to encrypted data. Doubly-spatial encryption (DSE) captures all functionalities that...
View ArticleAutomatic Protocol Selection in Secure Two-Party Computations, by Florian...
Performance of secure computation is still often an obstacle to its practical adaption. There are different protocols for secure computation that compete for the best performance. In this paper we...
View ArticleFrom Input Private to Universally Composable Secure Multiparty Computation...
Secure multiparty computation systems are commonly built form a small set of primitive components. Composability of security notions has a central role in the analysis of such systems, since it allows...
View ArticleVerifiable Computation over Encrypted Data in the Presence of Verification...
We consider the problem of a client who outsources the computation of a function $f$ over an input $x$ to a server, who returns $y=f(x)$. The client wants to be assured of the correctness of the...
View ArticleFormalizing Group Blind Signatures and Practical Constructions without Random...
Group blind signatures combine anonymity properties of both group signatures and blind signatures and offer privacy for both the message to be signed and the signer. Their applications include...
View Article