Quantcast
Channel: Cryptology ePrint Archive
Browsing all 30150 articles
Browse latest View live

Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms,...

Data publish-subscribe service is an effective approach to share and filter data. Due to the huge volume and velocity of data generated daily, cloud systems are inevitably becoming the platform for...

View Article


A Comprehensive Comparison of Shannon Entropy and Smooth Renyi Entropy, by...

We provide a new result that links two crucial entropy notions: Shannon entropy $\mathrm{H}_1$ and collision entropy $\mathrm{H}_2$. Our formula gives the \emph{worst possible} amount of collision...

View Article


Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID...

Sundaresan et al proposed recently a novel ownership transfer protocol for multi-tag multi-owner RFID environments that complies with the EPC Class1 Generation2 standard. The authors claim that this...

View Article

Privacy-Preserving Face Recognition with Outsourced Computation, by Can Xiang...

Face recognition is one of the most important biometrics pattern recognitions, which has been widely applied in a variety of enterprise, civilian and law enforcement. The privacy of biometrics data...

View Article

Jackpot Stealing Information From Large Caches via Huge Pages, by Gorka...

The cloud computing infrastructure relies on virtualized servers that provide isolation across guest OS's through sandboxing. This isolation was demonstrated to be imperfect in past work whichexploited...

View Article


Key recovery attacks on Grain family using BSW sampling and certain...

A novel internal state recovery attack on the whole Grain family of ciphers is proposed in this work. It basically uses the ideas of BSW sampling along with employing a weak placement of the tap...

View Article

A Chinese Remainder Theorem Approach to Bit-Parallel GF(2^n) Polynomial Basis...

We show that the step "modulo the degree-n field generating irreducible polynomial" in the classical definition of the GF(2^n) multiplication operation can be avoided. This leads to an alternative...

View Article

Generic Constructions of Integrated PKE and PEKS, by Yu Chen and Jiang Zhang...

In this paper we investigate the topic of integrated public-key encryption (PKE) and public-key encryption with keyword search (PEKS) schemes (PKE-PEKS as shorthand). We first formalize the strongest...

View Article


New Constructions of Revocable Identity-Based Encryption from Multilinear...

A revocation mechanism in cryptosystems for a large number of users is absolutely necessary to maintain the security of whole systems. A revocable identity-based encryption (RIBE) provides an efficient...

View Article


Key Derivation From Noisy Sources With More Errors Than Entropy, by Ran...

Fuzzy extractors (Dodis et al., Eurocrypt 2004) convert repeated noisy readings of a high-entropy secret into the same uniformly distributed key. To eliminate noise, they require an initial enrollment...

View Article

Publicly Evaluable Pseudorandom Functions and Their Applications, by Yu Chen...

We put forth the notion of publicly evaluable pseudorandom functions (PEPRFs), which is a non-trivial extension of the standard pseudorandom functions (PRFs). Briefly, PEPRFs are defined over domain...

View Article

Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Revisited...

Identity-based non-interactive key exchange (IB-NIKE) is a powerful but a bit overlooked primitive in identity-based cryptography. While identity-based encryption and signature have been extensively...

View Article

Improved Linear Cryptanalysis of Reduced-round SIMON, by Mohamed Ahmed...

SIMON is a family of ten lightweight block ciphers published by Beaulieu et al.\ from U.S. National Security Agency (NSA). In this paper we investigate the security of SIMON against different variants...

View Article


Automatic Enumeration of (Related-key) Differential and Linear...

In this paper, we investigate the Mixed-integer Linear Programming (MILP) modelling of the differential and linear behavior of a wide rang of block ciphers. The differential and linear behavior of the...

View Article

Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON, by...

SIMON is a family of lightweight block ciphers designed by the U.S. National Security Agency (NSA) that has attracted much attention since its publication in 2013. In this paper, we thoroughly...

View Article


Non-Linearity and Affine Equivalence of Permutations, by P R Mishra, Indivar...

In this paper we consider permutations on n symbols as bijections on Z/nZ. Treating permutations this way facilitates us with additional structures such as group, ring defined in the set Z/nZ. We...

View Article

Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers,...

Shortly following Cheon, Han, Lee, Ryu and Stehle attack against the multilinear map of Coron, Lepoint and Tibouchi (CLT), two independent approaches to thwart this attack have been proposed on the...

View Article


Geppetto: Versatile Verifiable Computation, by Craig Costello and Cédric...

Cloud computing sparked interest in Verifiable Computation protocols, which allow a weak client to securely outsource computations to remote parties. Recent work has dramatically reduced the client's...

View Article

Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible...

Physically unclonable functions (PUFs) exploit the unavoidable manufacturing variations of an integrated circuit (IC). Their input-output behavior serves as a unique IC 'fingerprint'. Therefore, they...

View Article

A New Method for Decomposition in the Jacobian of Small Genus Hyperelliptic...

Decomposing a divisor over a suitable factor basis in the Jacobian of a hyperelliptic curve is a crucial step in an index calculus algorithm for the discrete log problem in the Jacobian. For small...

View Article
Browsing all 30150 articles
Browse latest View live