Quantcast
Channel: Cryptology ePrint Archive
Browsing all 30150 articles
Browse latest View live

Doubly Spatial Encryption from DBDH, by Jie Chen and Hoeteck Wee

Functional encryption is an emerging paradigm for public-key encryption which enables fine-grained control of access to encrypted data. Doubly-spatial encryption (DSE) captures all functionalities that...

View Article


Sakai-Ohgishi-Kasahara Non-Interactive Identity-Based Key Exchange Scheme,...

Identity-based non-interactive key exchange (IB-NIKE) is a powerful but a bit overlooked primitive in identity-based cryptography. While identity-based encryption and signature have been extensively...

View Article


A Secure Cloud-based NFC Mobile Payment Protocol , by pardis pourghomi and...

Near Field Communication (NFC) is one the most recent technologies in the area of application development and service delivery via mobile phone. NFC enables the mobile phone to act as identification...

View Article

Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption,...

Secure computation on encrypted data stored on untrusted clouds is an important goal. Existing secure arithmetic computation techniques, such as fully homomorphic encryption (FHE) and somewhat...

View Article

Optimized Architecture for AES, by Abhijith P. S and Dr. Manish Goswami and...

This paper presents a highly optimized architecture for Advanced Encryption Standard (AES) by dividing and merging (combining) different sub operations in AES algorithm. The proposed architecture uses...

View Article


EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of...

This paper presents a standard-cell-based semi-automatic design methodology of a new conceptual countermeasure against electromagnetic (EM) analysis and fault-injection attacks. The countermeasure...

View Article

On the Multi-output Filtering Model and Its Applications, by Guang Gong and...

In this paper, we propose a novel technique, called multi-output filtering model, to study the non-randomness property of a cryptographic algorithm such as message authentication codes and block...

View Article

A Practical Second-Order Fault Attack against a Real-World Pairing...

Several fault attacks against pairing-based cryptography have been described theoretically in recent years. Interestingly, none of these have been practically evaluated. We accomplished this task and...

View Article


Secure Mutual Testing Strategy for Cryptographic SoCs, by Amitabh Das, Dusko...

This article presents a secure mutual testing strategy for System-on-Chips (SoCs) that implement cryptographic functionalities. Such approach eliminates the need for an additional trusted component...

View Article


Solving closest vector instances using an approximate shortest independent...

Given a lattice $L\subset\R^n$ and some target vector, this paper studies the algorithms for approximate closest vector problem (CVP$_\gamma$) by using an approximate shortest independent vectors...

View Article

Anonymous and Publicly Linkable Reputation Systems, by Johannes Blömer and...

Reputation systems are used to compute and publish reputation scores for services or products. We consider reputation systems where users are allowed to rate products that they purchased previously. To...

View Article

Authentication Schemes Based on Resilient Maps, by Juan Carlos Ku-Cauich and...

We introduce four constructions of systematic authentication codes. The first two are built over finite fields using resilient functions and they provide optimal impersonation and substitution...

View Article

Implicit factorization of unbalanced RSA moduli, by Abderrahmane Nitaj and...

Let N1 = p1q1 and N2 = p2q2 be two RSA moduli, not necessarily of the same bit-size. In 2009, May and Ritzenhofen proposed a method to factor N1 and N2 given the implicit information that p1 and p2...

View Article


New Attacks on the RSA Cryptosystem, by Abderrahmane Nitaj, Muhammad Rezal...

This paper presents three new attacks on the RSA cryptosystem. The rst two attacks work when k RSA public keys (Ni, ei) are such that there exist k relations of the shape eix-yi\phi(Ni)=zi or of the...

View Article

Function-Private Functional Encryption in the Private-Key Setting, by Zvika...

Functional encryption supports restricted decryption keys that allow users to learn specific functions of the encrypted messages. Whereas the vast majority of research on functional encryption has so...

View Article


Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD...

This paper investigates large linear mappings with very good diffusion and efficient software implementations, that can be used as part of a block cipher design. The mappings are derived from linear...

View Article

Efficient Record-Level Keyless Signatures for Audit Logs, by Ahto Buldas and...

We propose a log signing scheme that enables (a) verification of the integrity of the whole log, and (b) presentation of any record, along with a compact proof that the record has not been altered...

View Article


A Simpler Variant of Universally Composable Security for Standard Multiparty...

In this paper, we present a simpler and more restricted variant of the universally composable security (UC) framework that is suitable for ``standard'' two-party and multiparty computation tasks. Many...

View Article

On Virtual Grey Box Obfuscation for General Circuits, by Nir Bitansky and Ran...

An obfuscator $\O$ is Virtual Grey Box (VGB) for a class $\C$ of circuits if, for any $C\in\C$ and any predicate $\pi$, deducing $\pi(C)$ given $\O(C)$ is tantamount to deducing $\pi(C)$ given...

View Article

General Statistically Secure Computation with Bounded-Resettable Hardware...

Universally composable secure computation was assumed to require trusted setups, until it was realized that parties exchanging (untrusted) tamper-proof hardware tokens allow an alternative approach...

View Article
Browsing all 30150 articles
Browse latest View live