Sciweavers

CHES
2013
Springer
72views Cryptology» more  CHES 2013»
10 years 1 months ago
On the Simplicity of Converting Leakages from Multivariate to Univariate - (Case Study of a Glitch-Resistant Masking Scheme)
Abstract. Several masking schemes to protect cryptographic implementations against side-channel attacks have been proposed. A few considered the glitches, and provided security pro...
Amir Moradi, Oliver Mischke
ASIACRYPT
2013
Springer
10 years 1 months ago
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces
We define a novel notion of quasi-adaptive non-interactive zero knowledge (NIZK) proofs for probability distributions on parametrized languages. It is quasi-adaptive in the sense...
Charanjit S. Jutla, Arnab Roy
AFRICACRYPT
2013
Springer
10 years 1 months ago
GPU-Based Implementation of 128-Bit Secure Eta Pairing over a Binary Field
Eta pairing on a supersingular elliptic curve over the binary field F21223 used to offer 128-bit security, and has been studied extensively for efficient implementations. In this...
Utsab Bose, Anup Kumar Bhattacharya, Abhijit Das
ACNS
2013
Springer
127views Cryptology» more  ACNS 2013»
10 years 1 months ago
Transparent, Distributed, and Replicated Dynamic Provable Data Possession
With the growing trend toward using outsourced storage, the problem of efficiently checking and proving data integrity needs more consideration. Starting with PDP and POR schemes ...
Mohammad Etemad, Alptekin Küpçü
TCC
2014
Springer
155views Cryptology» more  TCC 2014»
10 years 1 months ago
Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding
We present a new general-purpose obfuscator for all polynomial-size circuits. The obfuscator uses graded encoding schemes, a generalization of multilinear maps. We prove that the ...
Zvika Brakerski, Guy N. Rothblum
EUROCRYPT
2012
Springer
11 years 8 months ago
Property Preserving Symmetric Encryption
Abstract. Processing on encrypted data is a subject of rich investigation. Several new and exotic encryption schemes, supporting a diverse set of features, have been developed for ...
Omkant Pandey, Yannis Rouselakis
EUROCRYPT
2012
Springer
11 years 8 months ago
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
This paper proposes the first inner product encryption (IPE) scheme that is adaptively secure and fully attribute-hiding (attribute-hiding in the sense of the definition by Katz...
Tatsuaki Okamoto, Katsuyuki Takashima
EUROCRYPT
2012
Springer
11 years 8 months ago
Fully Homomorphic Encryption with Polylog Overhead
We show that homomorphic evaluation of (wide enough) arithmetic circuits can be accomplished with only polylogarithmic overhead. Namely, we present a construction of fully homomorp...
Craig Gentry, Shai Halevi, Nigel P. Smart
EUROCRYPT
2012
Springer
11 years 8 months ago
Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding
Decoding random linear codes is a well studied problem with many applications in complexity theory and cryptography. The security of almost all coding and LPN/LWE-based schemes rel...
Anja Becker, Antoine Joux, Alexander May, Alexande...
EUROCRYPT
2012
Springer
11 years 8 months ago
Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields
Abstract. The goal of this paper is to further study the index calculus method that was first introduced by Semaev for solving the ECDLP and later developed by Gaudry and Diem. In...
Jean-Charles Faugère, Ludovic Perret, Chris...