Quantcast
Channel: Cryptology ePrint Archive
Browsing all 30150 articles
Browse latest View live

Indistinguishability Obfuscation from Semantically-Secure Multilinear...

We define a notion of semantic security of multilinear (a.k.a. graded) encoding schemes, which generalizes a multilinear DDH assumption: roughly speaking, we require that if two constant-length...

View Article


A Second Look at Fischlin's Transformation, by Özgür Dagdelen and Daniele...

Fischlin's transformation is an alternative to the standard Fiat-Shamir transform to turn a certain class of public key identification schemes into digital signatures (in the random oracle model). We...

View Article


Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment, by...

Sealed-Bid auction is an efficient and rational method to establish the price in open market. However sealed-bid auctions are sub- ject to bid-rigging attack. Receipt-free mechanisms were proposed to...

View Article

The Temperature Side Channel and Heating Fault Attacks, by Michael Hutter and...

In this paper, we present practical results of data leakages of CMOS devices via the temperature side channel---a side channel that has been widely cited in literature but not well characterized yet....

View Article

Side-Channel Analysis on Blinded Regular Scalar Multiplications, by Benoit...

We present a new side-channel attack path threatening state-of-the-art protected implementations of elliptic curves embedded scalar multiplications. Regular algorithms such as the double-and-add-always...

View Article


Two-sources Randomness Extractors for Elliptic Curves, by Abdoul Aziz Ciss

This paper studies the task of two-sources randomness extractors for elliptic curves defined over finite fields $K$, where $K$ can be a prime or a binary field. In fact, we introduce new constructions...

View Article

A New Object Searching Protocol for Multi-tag RFID, by Subhasish Dhal and...

Searching an object from a large set is a tedious task. Radio Frequency IDentification (RFID) technology helps us to search the desired object efficiently. In this technology, a small chip called RFID...

View Article

A Comparison of the Homomorphic Encryption Schemes FV and YASHE, by Tancrède...

We conduct a theoretical and practical comparison of two Ring-LWE-based, scale-invariant, leveled homomorphic encryption schemes - Fan and Vercauteren's adaptation of BGV and the YASHE scheme proposed...

View Article


JHAE: An Authenticated Encryption Mode Based on JH, by Javad Alizadeh,...

In this paper we present JHAE, an authenticated encryption (AE) mode based on the JH hash mode. JHAE is a dedicated AE mode based on permutation. We prove that this mode, based on ideal permutation, is...

View Article


Cryptanalysis and Security Enhancement of Two Advanced Authentication...

In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Jiang et al., is a password-based authentication scheme which does not use smart cards. We...

View Article

Low Overhead Broadcast Encryption from Multilinear Maps, by Dan Boneh and...

We use multilinear maps to provide a solution to the long-standing problem of public-key broadcast encryption where all parameters in the system are small. In our constructions, ciphertext overhead,...

View Article

Quantum algorithms to check Resiliency, Symmetry and Linearity of a Boolean...

In this paper, we present related quantum algorithms to check the order of resiliency, symmetry and linearity of a Boolean function that is available as a black-box (oracle). First we consider...

View Article

Crypto-Multimedia, by Benlcouiri Younes and Azizi Abdelmalek and Moulay Chrif...

This paper is structured on securing of storage, transmission and the traceability of digital images. It consists in the design of the cryptographic algorithms appropriate to the case of fixed and...

View Article


Breaking POET Authentication with a Single Query, by Jian Guo and Jérémy Jean...

In this short article, we describe a very practical and simple attack on the authentication part of POET authenticated encryption mode proposed at FSE 2014. POET is a provably secure scheme that was...

View Article

Fast GPGPU-Based Elliptic Curve Scalar Multiplication, by Eric M. Mahé and...

This paper presents a fast implementation to compute the scalar multiplication of elliptic curve points based on a ``General-Purpose computing on Graphics Processing Units'' (GPGPU) approach. A GPU...

View Article


Doubly Spatial Encryption from DBDH, by Jie Chen and Hoeteck Wee

Functional encryption is an emerging paradigm for public-key encryption which enables fine-grained control of access to encrypted data. Doubly-spatial encryption (DSE) captures all functionalities that...

View Article

Automatic Protocol Selection in Secure Two-Party Computations, by Florian...

Performance of secure computation is still often an obstacle to its practical adaption. There are different protocols for secure computation that compete for the best performance. In this paper we...

View Article


From Input Private to Universally Composable Secure Multiparty Computation...

Secure multiparty computation systems are commonly built form a small set of primitive components. Composability of security notions has a central role in the analysis of such systems, since it allows...

View Article

Verifiable Computation over Encrypted Data in the Presence of Verification...

We consider the problem of a client who outsources the computation of a function $f$ over an input $x$ to a server, who returns $y=f(x)$. The client wants to be assured of the correctness of the...

View Article

Formalizing Group Blind Signatures and Practical Constructions without Random...

Group blind signatures combine anonymity properties of both group signatures and blind signatures and offer privacy for both the message to be signed and the signer. Their applications include...

View Article
Browsing all 30150 articles
Browse latest View live