Sciweavers

CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters
CRYPTO
2009
Springer
150views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Improving the Security of Quantum Protocols via Commit-and-Open
We consider two-party quantum protocols starting with a transmission of some random BB84 qubits followed by classical messages. We show a general “compiler” improving the secur...
Ivan Damgård, Serge Fehr, Carolin Lunemann, ...
CRYPTO
2009
Springer
109views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Randomizable Proofs and Delegatable Anonymous Credentials
We construct an efficient delegatable anonymous credentials system. Users can anonymously and unlinkably obtain credentials from any authority, delegate their credentials to other ...
Mira Belenkiy, Jan Camenisch, Melissa Chase, Marku...
CRYPTO
2009
Springer
144views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
On the Composition of Public-Coin Zero-Knowledge Protocols
Abstract. We show that only languages in BPP have public-coin, blackbox zero-knowledge protocols that are secure under an unbounded (polynomial) number of parallel repetitions. Thi...
Rafael Pass, Wei-Lung Dustin Tseng, Douglas Wikstr...
CRYPTO
2009
Springer
140views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Batch Binary Edwards
Daniel J. Bernstein
CRYPTO
2009
Springer
154views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
On Bounded Distance Decoding, Unique Shortest Vectors, and the Minimum Distance Problem
We prove the equivalence, up to a small polynomial approximation factor n/ log n, of the lattice problems uSVP (unique Shortest Vector Problem), BDD (Bounded Distance Decoding) and...
Vadim Lyubashevsky, Daniele Micciancio
CRYPTO
2009
Springer
106views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
New Birthday Attacks on Some MACs Based on Block Ciphers
Zheng Yuan, Wei Wang, Keting Jia, Guangwu Xu, Xiao...
CRYPTO
2009
Springer
87views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Reconstructing RSA Private Keys from Random Key Bits
sion of an extended abstract published in Proceedings of Crypto 2009, Springer-Verlag, 2009. Available from the IACR Cryptology ePrint Archive as Report 2008/510. We show that an ...
Nadia Heninger, Hovav Shacham
CRYPTO
2009
Springer
150views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Short and Stateless Signatures from the RSA Assumption
We present the first signature scheme which is “short”, stateless and secure under the RSA assumption in the standard model. Prior short, standard model signatures in the RSA...
Susan Hohenberger, Brent Waters
CRYPTO
2009
Springer
119views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
How Risky Is the Random-Oracle Model?
RSA-FDH and many other schemes secure in the Random-Oracle Model (ROM) require a hash function with output size larger than standard sizes. We show that the random-oracle instanti...
Gaëtan Leurent, Phong Q. Nguyen