Sciweavers

Share
IACR
2016
46views Biometrics» more  IACR 2016»
3 years 5 months ago
OPFE: Outsourcing Computation for Private Function Evaluation
Outsourcing secure multiparty computation (SMC) protocols has allowed resource-constrained devices to take advantage of these developing cryptographic primitives with great effici...
Henry Carter, Patrick Traynor
IACR
2016
51views Biometrics» more  IACR 2016»
3 years 5 months ago
Nonce-based Kerberos is a Secure Delegated AKE Protocol
Abstract. Kerberos is one of the most important cryptographic protocols, first because it is the basisc authentication protocol in Microsoft’s Active Directory and shipped with ...
Jörg Schwenk
IACR
2016
41views Biometrics» more  IACR 2016»
3 years 5 months ago
A Subgradient Algorithm For Computational Distances and Applications to Cryptography
The task of finding a constructive approximation in the computational distance, while simultaneously preserving additional constrains (referred to as "simulators"), app...
Maciej Skórski
IACR
2016
45views Biometrics» more  IACR 2016»
3 years 5 months ago
A note on Tensor Simple Matrix Encryption Scheme
The simple matrix encryption scheme (Tao-Diene-Tang-Ding, PQCrypto 2013) has a problem of decryption failures. Quite recently, Petzoldt-Ding-Wang (http://eprint.iacr. org/2016/010...
Yasufumi Hashimoto
IACR
2016
52views Biometrics» more  IACR 2016»
3 years 5 months ago
Robust Password-Protected Secret Sharing
Abstract. Password-protected secret sharing (PPSS) schemes allow a user to publicly share this highentropy secret across different servers and to later recover it by interacting w...
Michel Abdalla, Mario Cornejo, Anca Nitulescu, Dav...
IACR
2016
48views Biometrics» more  IACR 2016»
3 years 5 months ago
Proofs of Space-Time and Rational Proofs of Storage
Abstract. We introduce a new cryptographic primitive: Proofs of SpaceTime (PoSTs) and construct a practical protocol for implementing these proofs. A PoST allows a prover to convin...
Tal Moran, Ilan Orlov
IACR
2016
59views Biometrics» more  IACR 2016»
3 years 5 months ago
Access Control Encryption: Enforcing Information Flow with Cryptography
We initiate the study of Access Control Encryption (ACE), a novel cryptographic primitive that allows fine-grained access control, by giving different rights to different users ...
Ivan Damgård, Helene Haagh, Claudio Orlandi
IACR
2016
47views Biometrics» more  IACR 2016»
3 years 5 months ago
Commutativity, Associativity, and Public Key Cryptography
In this paper, we will study some possible generalizations of the famous Diffie-Hellman algorithm. As we will see, at the end, most of these generalizations will not be secure or w...
Jacques Patarin, Valérie Nachef
IACR
2016
39views Biometrics» more  IACR 2016»
3 years 5 months ago
How to Generalize RSA Cryptanalyses
Recently, the security of RSA variants with moduli N = pr q, e.g., the Takagi RSA and the prime power RSA, have been actively studied in several papers. Due to the unusual composit...
Atsushi Takayasu, Noboru Kunihiro
IACR
2016
68views Biometrics» more  IACR 2016»
3 years 5 months ago
From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions
Universally composable multi-party computation is impossible without setup assumptions. Motivated by the ubiquitous use of secure hardware in many real world security applications...
Nico Döttling, Daniel Kraschewski, Jörn ...
books