Filters








71 Hits in 6.2 sec

Chosen-Ciphertext Security via Correlated Products [chapter]

Alon Rosen, Gil Segev
<span title="">2009</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
The main motivation of this study is the construction of public-key encryption schemes that are secure against chosen-ciphertext attacks (CCA).  ...  Specifically, there is no fully-black-box construction of lossy trapdoor functions from trapdoor functions that are secure under correlated products.  ...  Recently, Peikert and Waters [31] introduced the intriguing notion of lossy trapdoor functions, and demonstrated that such functions can be used to construct a CCA-secure public-key encryption scheme  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-00457-5_25">doi:10.1007/978-3-642-00457-5_25</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fxrw6r7yx5ewhkjelqupfnjt6q">fatcat:fxrw6r7yx5ewhkjelqupfnjt6q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180726204505/https://link.springer.com/content/pdf/10.1007%2F978-3-642-00457-5_25.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c2/8a/c28ac1fa52b9199309eb6d57141e772d7ed53d46.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-00457-5_25"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Lossy trapdoor functions and their applications

Chris Peikert, Brent Waters
<span title="">2008</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jlc5kugafjg4dl7ozagimqfcbm" style="color: black;">Proceedings of the fourtieth annual ACM symposium on Theory of computing - STOC 08</a> </i> &nbsp;
In public-key cryptography in particular, two important notions are trapdoor functions (TDFs) and security under chosen ciphertext attack (CCA security) [47, 55, 23] .  ...  A tempting approach is to generate the function description as a public encryption key pk, letting its trapdoor be the matching secret decryption key sk, and defining f pk (x) = E pk (x; x).  ...  Acknowledgments We are grateful to Dan Boneh for offering important insights in the early stages of this work, to Cynthia Dwork and Salil Vadhan for helpful comments, to Daniele Micciancio for suggesting a simpler  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1374376.1374406">doi:10.1145/1374376.1374406</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/stoc/PeikertW08.html">dblp:conf/stoc/PeikertW08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/x5livcstg5ajtmltxzhgatovmy">fatcat:x5livcstg5ajtmltxzhgatovmy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170813235514/http://web.eecs.umich.edu/~cpeikert/pubs/lossy_tdf.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ed/d5/edd53b8b4b6aa21b29c80e3354aae7f5fda06c3e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1374376.1374406"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Lossy Trapdoor Functions and Their Applications

Chris Peikert, Brent Waters
<span title="">2011</span> <i title="Society for Industrial &amp; Applied Mathematics (SIAM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7dys7zoberdktmxyjciuy5bnse" style="color: black;">SIAM journal on computing (Print)</a> </i> &nbsp;
In public-key cryptography in particular, two important notions are trapdoor functions (TDFs) and security under chosen ciphertext attack (CCA security) [47, 55, 23] .  ...  A tempting approach is to generate the function description as a public encryption key pk, letting its trapdoor be the matching secret decryption key sk, and defining f pk (x) = E pk (x; x).  ...  Acknowledgments We are grateful to Dan Boneh for offering important insights in the early stages of this work, to Cynthia Dwork and Salil Vadhan for helpful comments, to Daniele Micciancio for suggesting a simpler  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1137/080733954">doi:10.1137/080733954</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/aar54oj7angjfowcrtacu2hqye">fatcat:aar54oj7angjfowcrtacu2hqye</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170813235514/http://web.eecs.umich.edu/~cpeikert/pubs/lossy_tdf.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ed/d5/edd53b8b4b6aa21b29c80e3354aae7f5fda06c3e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1137/080733954"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Chosen-Ciphertext Security via Correlated Products

Alon Rosen, Gil Segev
<span title="">2010</span> <i title="Society for Industrial &amp; Applied Mathematics (SIAM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7dys7zoberdktmxyjciuy5bnse" style="color: black;">SIAM journal on computing (Print)</a> </i> &nbsp;
We show that any collection of injective trapdoor functions that is secure under a very natural correlated product can be used to construct a CCA-secure public-key encryption scheme.  ...  The main motivation of this study is the construction of public-key encryption schemes that are secure against chosen-ciphertext attacks (CCA).  ...  Recently, Peikert and Waters [29] introduced the intriguing notion of lossy trapdoor functions, and demonstrated that such functions can be used to construct an elegant CCA-secure public-key encryption  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1137/100782929">doi:10.1137/100782929</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cltnawkcdze2jhkx7rc6qfnjkm">fatcat:cltnawkcdze2jhkx7rc6qfnjkm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20081002132607/http://eprint.iacr.org/2008/116.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9f/f7/9ff7c0a210f4929d353c8fb01a110a3700d05e4a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1137/100782929"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Extended-DDH and Lossy Trapdoor Functions [chapter]

Brett Hemenway, Rafail Ostrovsky
<span title="">2012</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Lossy trapdoor functions were used to build the first injective trapdoor functions based on DDH, the first IND-CCA cryptosystems based on lattice assumptions, and they are known to imply deterministic  ...  encryption, collision resistant hash-functions, oblivious transfer and a host of other important primitives.  ...  Lossy trapdoor functions are known to imply IND-CCA secure encryption.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-30057-8_37">doi:10.1007/978-3-642-30057-8_37</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ylvx7jvxuze7pbjrjo2lqrkhnm">fatcat:ylvx7jvxuze7pbjrjo2lqrkhnm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190304011204/http://pdfs.semanticscholar.org/be47/661d061fd227e3140ccd559952ac82ba2ea4.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/be/47/be47661d061fd227e3140ccd559952ac82ba2ea4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-30057-8_37"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks [chapter]

Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee
<span title="">2010</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
(Passive) SOA security from lossy encryption. Lossy encryption schemes have the property that the scheme's "real" public key can be substituted with a "lossy" public key.  ...  The result is a rather practical SO-CCA secure public-key encryption scheme that does not suffer from the efficiency drawbacks of known schemes.  ...  This work was initiated at the Securing Cyberspace Reunion Conference in 2009; we thank IPAM and the conference organizers for their hospitality.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-13190-5_20">doi:10.1007/978-3-642-13190-5_20</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mz623dyan5gqno7njawwzbohny">fatcat:mz623dyan5gqno7njawwzbohny</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20110331201240/http://homepages.cwi.nl/~fehr/mypapers/FHKW10.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5d/0f/5d0f80ed351923fadaa1432b0c04f727d4a23a86.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-13190-5_20"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Adaptive Trapdoor Functions and Chosen-Ciphertext Security [chapter]

Eike Kiltz, Payman Mohassel, Adam O'Neill
<span title="">2010</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Our main application is the black-box construction of chosenciphertext secure public-key encryption (CCA-secure PKE).  ...  TDFs, or lossy TDFs introduced by Peikert and Waters (STOC '08), yield precisely the CCA-secure PKE schemes in these works.  ...  We then show black-box constructions of CCA-secure PKE from these notions. Adaptive Trapdoor Functions Trapdoor Functions.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-13190-5_34">doi:10.1007/978-3-642-13190-5_34</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/im7gafl5mfgjxivngjgxdgb5yi">fatcat:im7gafl5mfgjxivngjgxdgb5yi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809034448/http://homepage.ruhr-uni-bochum.de/Eike.Kiltz/papers/ATDF.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9a/17/9a176675a866009a637db58160b974607e44e4ad.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-13190-5_34"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Efficient Chosen-Ciphertext Security via Extractable Hash Proofs [chapter]

Hoeteck Wee
<span title="">2010</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Using our framework, we obtain the first CCA-secure encryption scheme based on CDH where the public key is a constant number of group elements and a more modular and conceptually simpler variant of the  ...  Since the breakthrough work of Peikert and Waters on lossy trapdoor functions [36], a series of works has identified successively weaker general assumptions from which we may realize CCA-secure encryption  ...  I thank the anonymous Crypto 2010 reviewers for pointing out that our framework applies to the constructions in [7, 27, 28] , for suggesting the name "adaptive trapdoor relations", and for many helpful  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-14623-7_17">doi:10.1007/978-3-642-14623-7_17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gy2trq7ypbb6ddz4ywaole7zya">fatcat:gy2trq7ypbb6ddz4ywaole7zya</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20181030104937/https://link.springer.com/content/pdf/10.1007%2F978-3-642-14623-7_17.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2f/6c/2f6cffa162a78137269465e762f351ab7f7cf49f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-14623-7_17"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Deterministic Public-Key Encryption Under Continual Leakage [chapter]

Venkata Koppula, Omkant Pandey, Yannis Rouselakis, Brent Waters
<span title="">2016</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We initiate the study of deterministic public-key encryption (D-PKE) in the presence of leakage.  ...  At a technical level, we propose and construct a "continual leakage resilient" version of the all-but-one lossy trapdoor functions, introduced by Peikert and Waters (STOC 2008).  ...  We argue that the above system is a correct, continual-leakage resilient, CCA-secure public key encryption system.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-39555-5_17">doi:10.1007/978-3-319-39555-5_17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/htodefptarcynfb6yvxwj46sge">fatcat:htodefptarcynfb6yvxwj46sge</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20151022142655/http://eprint.iacr.org/2014/780.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ec/2f/ec2fab553725612ec172a2d10c0980c5f27294bc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-39555-5_17"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

All-But-Many Lossy Trapdoor Functions from Lattices and Applications [chapter]

Xavier Boyen, Qinyi Li
<span title="">2017</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
ABM-LTFs are parametrised with tags: a lossy tag makes the function lossy; an injective tag makes the function injective, and invertible with a trapdoor.  ...  Additionally, our ABM-LTF answers the open question of constructing (non-necessarily lossy) all-but-many trapdoor functions from lattices, first asked by Alperin-Sheriff and Peikert (PKC 2012).  ...  IND-SO-CCA2 Public-Key Encryption.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-63697-9_11">doi:10.1007/978-3-319-63697-9_11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pmo3lrzhznfe7nftg5qgrj3nhm">fatcat:pmo3lrzhznfe7nftg5qgrj3nhm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170709234915/http://eprint.iacr.org/2017/532.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e8/98/e898f24add01ae05414ee134d27a13483e422409.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-63697-9_11"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Inner-Product Lossy Trapdoor Functions and Applications [chapter]

Xiang Xie, Rui Xue, Rui Zhang
<span title="">2012</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this paper, we propose a new cryptographic primitive called inner-product lossy trapdoor function (IPLTDF). We give a formal definition, and a concrete construction from lattices.  ...  The resulting IPE scheme has almost the same public key size for multi-bit encryption compared with a recent IPE scheme proposed by Agrawal, Freeman and Vaikuntanathan [2] for single-bit encryption.  ...  Chosen-Ciphertext Secure Inner-Product Encryption. Peikert and Waters [27] gave a framework to construct chosen-ciphertext secure public key encryption schemes from lossy trapdoor functions.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-31284-7_12">doi:10.1007/978-3-642-31284-7_12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qwivhrs52jgazhrzaaa33qu234">fatcat:qwivhrs52jgazhrzaaa33qu234</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190505110139/https://link.springer.com/content/pdf/10.1007%2F978-3-642-31284-7_12.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d2/f9/d2f9b46ca217d7335dc48c3c50710988b40e1af5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-31284-7_12"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems [chapter]

Ronald Cramer, Dennis Hofheinz, Eike Kiltz
<span title="">2010</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
The Naor-Yung (NY) paradigm shows how to build a chosenciphertext secure encryption scheme from three conceptual ingredients: a weakly (i.e., IND-CPA) secure encryption scheme, a "replication strategy"  ...  This way, practical IND-CCA secure encryption schemes based on search problems can be built and explained in a generic, NY-like fashion.  ...  Key Encapsulation Mechanisms Instead of a public-key encryption scheme we consider the conceptually simpler KEM framework.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-11799-2_10">doi:10.1007/978-3-642-11799-2_10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nelncad76fhinfsddxvcmunm5i">fatcat:nelncad76fhinfsddxvcmunm5i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180727164914/https://link.springer.com/content/pdf/10.1007%2F978-3-642-11799-2_10.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1b/33/1b33c536204d50a223c7b3b469a6d83725e9d40c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-11799-2_10"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme [article]

Roohallah Rastaghi
<span title="2013-03-01">2013</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
IND-CCA2 security of this scheme can be tightly reduced in the standard model to the assumption that the underlying primitive is an one-way trapdoor function.  ...  This novel approach is a "black-box" construction and leads to the elimination of separate encryption, as it avoids using general transformation from CPA-secure scheme to a CCA2-secure one.  ...  The public/secret keys are as in the original scheme. The length of the ciphertext is equal to n + (k − h)s + k.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1302.6352v2">arXiv:1302.6352v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/e4k3nyenjfa6pd7crppaqflcf4">fatcat:e4k3nyenjfa6pd7crppaqflcf4</a> </span>
<a target="_blank" rel="noopener" href="https://archive.org/download/arxiv-1302.6352/1302.6352.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> File Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1302.6352v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing [chapter]

Baodong Qin, Shengli Liu
<span title="">2014</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In AsiaCrypt 2013, Qin and Liu proposed a new approach to CCA-security of Public-Key Encryption (PKE) in the presence of bounded key-leakage, from any universal hash proof system (due to Cramer and Shoup  ...  -With the RSI assumption over a specific group (free of pairing), public parameters of UHP and OT-LF can be chosen in a flexible way, resulting in a leakage-flexible CCA-secure PKE scheme.  ...  As far as we know, this is the first pairing-free LR-CCA secure PKE with leakage rate of 1 − o (1) .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-54631-0_2">doi:10.1007/978-3-642-54631-0_2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/sr2zie5dyvfphiz4cldltgbiom">fatcat:sr2zie5dyvfphiz4cldltgbiom</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190501212827/https://link.springer.com/content/pdf/10.1007%2F978-3-642-54631-0_2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/31/ce/31ce501c8d8ea5e7b427233a6055b5efbb03bd80.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-54631-0_2"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model [chapter]

Ron Steinfeld, San Ling, Josef Pieprzyk, Christophe Tartary, Huaxiong Wang
<span title="">2012</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
As an intermediate step, we present a construction for an All-But-One (ABO) lossy trapdoor function from pNE, which may be of independent interest.  ...  NTRUEncrypt is a fast and practical lattice-based public-key encryption scheme, which has been standardized by IEEE, but until recently, its security analysis relied only on heuristic arguments.  ...  The Peikert-Waters construction [26] of IND-CCA2 encryption from ABO lossy trapdoor functions uses a pair of ABO lossy trapdoor functions F 1 and F 2 5 .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-30057-8_21">doi:10.1007/978-3-642-30057-8_21</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5pcdq34otjbexajswvgq5gyi64">fatcat:5pcdq34otjbexajswvgq5gyi64</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922103142/http://eprints.qut.edu.au/69695/2/Authors_draft_Pieprzyk.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/64/e2/64e2c3344b09fa777f0636c9654b92cef755c9a8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-30057-8_21"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 71 results