Filters








82,123 Hits in 5.0 sec

New Definitions and Separations for Circular Security [chapter]

David Cash, Matthew Green, Susan Hohenberger
2012 Lecture Notes in Computer Science  
In both of these results, which also apply to the stronger circular security definition, we actually show for the first time an attack in which the adversary can recover the secret key of an otherwise-secure  ...  Specifically, we show: • For symmetric encryption, under the minimal assumption that one-way functions exist, n-weak circular (CPA) security is not implied by CCA security, for any n.  ...  Acknowledgments The authors thank Ronald Rivest for the suggestion to view the public key counterexample in Section 4 as a potential building block for other functionalities.  ... 
doi:10.1007/978-3-642-30057-8_32 fatcat:q4cmsjvdsvgibfvydurixoxxdy

Separating IND-CPA and Circular Security for Unbounded Length Key Cycles [chapter]

Rishab Goyal, Venkata Koppula, Brent Waters
2017 Lecture Notes in Computer Science  
One interesting question is whether circular security comes for free from IND-CPA security.  ...  The question for n > 1 was open for some time, and was resolved by Acar et al. [1] . They showed, under the SXDH assumption, an IND-CPA secure encryption scheme that was not 2-circular secure.  ...  Separating IND-CPA and Circular Security First, let us recall the theorem statement from [24] .  ... 
doi:10.1007/978-3-662-54365-8_10 fatcat:wd3fmijg2zb2bezgohpenhoswq

Page 416 of The New England Journal of Medicine Vol. 203, Issue 9 [page]

1930 The New England Journal of Medicine  
A pastoral letter of Cardinal Haves of New York, sincerely requesting and advising the immunization of the children of the parochial schools of New York was quoted in these circular letters and in the  ...  ., and gave them a definite idea of just what diphtheria prevention meant.  ... 

Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions [chapter]

Mohammad Hajiabadi, Bruce M. Kapron
2017 Lecture Notes in Computer Science  
Our separation model follows that of Gertner, Malkin and Reingold (FOCS'01), which is a weaker separation model than that of Impagliazzo and Rudich.  ...  While for t = 1 a folklore construction, based on CPA-secure encryption, can be used to build a 1-circular-secure encryption with the same secret-key and message space, no such constructions are known  ...  We would like to thank Mohammad Mahmoody for helpful conversations in an early stage of our work. We are also grateful to the anonymous reviewers for their comments.  ... 
doi:10.1007/978-3-319-56614-6_19 fatcat:6ssew5f74ndajamwlhbwufvp4u

Randomness-Dependent Message Security [chapter]

Eleanor Birrell, Kai-Min Chung, Rafael Pass, Sidharth Telang
2013 Lecture Notes in Computer Science  
The above-mentioned works either implicitly (as in [38] and [35]), or explicitly (as in [33] ) consider and design encryption schemes that are circular-RDM secure for the specific randomness-dependent  ...  encryptions, in a circular way, leads to new powerful techniques in the design of encryption schemes.  ...  Furthermore, Π is circular RDM secure if Π is k c -circular RDM secure for every constant c. q-circular-CCA and circular-CCA RDM security are defined in analogous way. Remark.  ... 
doi:10.1007/978-3-642-36594-2_39 fatcat:wk2a5ia5ifbufamvbdta2qiupy

On the Circular Security of Bit-Encryption [chapter]

Ron D. Rothblum
2013 Lecture Notes in Computer Science  
That is, there is no reduction of circular security of a bitencryption scheme to semantic security of that very same scheme that uses both the encryption scheme and the adversary as black-boxes.  ...  As a final contribution, we show an equivalence between three seemingly distinct notions of circular security for public-key bit-encryption schemes.  ...  I would like to thank Benny Applebaum, Oded Goldreich and Allison Lewko for very helpful conversations and comments.  ... 
doi:10.1007/978-3-642-36594-2_32 fatcat:lhivwzxiufdh3kawu37myacwge

Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption [chapter]

Rishab Goyal, Venkata Koppula, Brent Waters
2017 Lecture Notes in Computer Science  
In this work we separate private-key semantic security from 1-circular security for bit encryption using the Learning with Error assumption.  ...  To achieve our results we develop new techniques for obliviously evaluating branching programs.  ...  This allows us to show a separation between private-key semantic security and circular security for bit encryption schemes.  ... 
doi:10.1007/978-3-319-56614-6_18 fatcat:5qgt77uqnngpzigtoomjr3o4by

Achieving subspace or key security for WOA using natural or circular watermarking

Patrick Bas, François Cayre
2006 Proceeding of the 8th workshop on Multimedia and security - MM&Sec '06  
The definition of watermark security is first recalled and the distinction between key-security and subspace-security classes for Spread Spectrum (SS) watermarking schemes is presented afterwards.  ...  Blind source separation techniques are also recalled as a tool to assess the security of a SS watermarking scheme and prove that classical SS and Improved SS are not secure within the WOA framework.  ...  ACI-SI Fabriano, RIAM Estivale and ARA TSAR.  ... 
doi:10.1145/1161366.1161381 dblp:conf/mmsec/BasC06 fatcat:33ovwxifwvconotwicfusqxij4

Reproducible Circularly Secure Bit Encryption: Applications and Realizations

Mohammad Hajiabadi, Bruce M. Kapron
2016 Journal of Cryptology  
We give generic constructions of several fundamental cryptographic primitives based on a new encryption primitive that combines circular security for bit encryption with the so-called reproducibility property  ...  trapdoor-function family (TDF) to circular security of the base scheme.  ...  Fix u ∈ ω(log n) and let l i = l+p r +u and l o = 2l+p r −λ. Our goal is to build an (l i , l o )-INDsecure deterministic encryption scheme.  ... 
doi:10.1007/s00145-016-9246-4 fatcat:pq6mkmii6rg63jesjem6nvtp7y

Page 686 of The American Journal of International Law Vol. 22, Issue 3 [page]

1928 The American Journal of International Law  
The circular further recited that ‘‘ Delivery will be made upon receipt of New York funds in the form of our own temporary receipt, exchangeable for the definitive bonds upon their arrival from Europe.  ...  tions, in a separate portfolio, marked ‘property of Zimmermann & Forshay, New York.’ ” This circular further recited that the bonds would be “‘ delivered free of all expense;”’ that they were offered  ... 

Reproducible Circularly-Secure Bit Encryption: Applications and Realizations [chapter]

Mohammad Hajiabadi, Bruce M. Kapron
2015 Lecture Notes in Computer Science  
We give generic constructions of several fundamental cryptographic primitives based on a new encryption primitive that combines circular security for bit encryption with the so-called reproducibility property  ...  trapdoor-function family (TDF) to circular security of the base scheme.  ...  Fix u ∈ ω(log n) and let l i = l+p r +u and l o = 2l+p r −λ. Our goal is to build an (l i , l o )-INDsecure deterministic encryption scheme.  ... 
doi:10.1007/978-3-662-47989-6_11 fatcat:fnvj6zwqynfgvmrpqrpkzvhylu

Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding

Fran�ois Cayre, Patrick Bas
2008 IEEE Transactions on Information Forensics and Security  
The first one is called Natural Watermarking and can be made either stego-secure or subspace-secure. The second is called Circular Watermarking and is key-secure.  ...  To illustrate these views, we present two new modulations for truly secure watermarking in the Watermark-Only-Attack (WOA) framework.  ...  ACKNOWLEDGMENT The authors would like to take this opportunity to thank Teddy Furon for helpful discussions and Amaury Lendasse for insights on differential entropy estimation.  ... 
doi:10.1109/tifs.2007.916006 fatcat:tvjzlgejibbrhfbt7wti32pmhm

Cryptographic Agility and Its Relation to Circular Encryption [chapter]

Tolga Acar, Mira Belenkiy, Mihir Bellare, David Cash
2010 Lecture Notes in Computer Science  
We resolve the second question in the negative and thereby the first as well. We go on to provide a comprehensive treatment of agility, with definitions for various different primitives.  ...  On the theoretical side our work uncovers new notions and relations and settles stated open questions, and on the practical side it serves to guide developers.  ...  Acknowledgments The third and fourth authors were supported in part by NSF grants CNS-  ... 
doi:10.1007/978-3-642-13190-5_21 fatcat:lra6qk7gsffypan6jkc3uqn46a

Circular and temporary migration regimes and their implications for family

Piyasiri Wickramasekara
2013 Qscience proceedings  
The first part of the paper outlines definitions of circular migration and family migration.  ...  Circular migration is nothing new as it has long been rooted in internal migrations and cross border migration flows.  ...  Definitions of circular migration and family.  ... 
doi:10.5339/qproc.2013.fmd.1 fatcat:oqtdngshdngrxacqznpdbbjxc4

Page 304 of Medical News Vol. 51, Issue 11 [page]

1887 Medical News  
Objection was made to the various forms of suture used in circular enterorrhaphy for three reasons: first, the time required for their insertion ; second, the danger of puncturing the bowel; and third,  ...  Upon the subject of craniotomy, he remarked, ‘‘ Under the new régime the interests of the living child will constitute a more important factor, and justly so, for in the ideal future the child shall be  ... 
« Previous Showing results 1 — 15 out of 82,123 results