Sciweavers

IACR
2016
41views Biometrics» more  IACR 2016»
8 years 1 months ago
How To Simulate It - A Tutorial on the Simulation Proof Technique
One of the most fundamental notions of cryptography is that of simulation. It stands behind the concepts of semantic security, zero knowledge, and security for multiparty computat...
Yehuda Lindell
IACR
2016
42views Biometrics» more  IACR 2016»
8 years 1 months ago
Post-quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation
Abstract. We examine the IND-qCPA security of the wide-spread block cipher modes of operation CBC, CFB, OFB, CTR, and XTS (i.e., security against quantum adversaries doing queries ...
Mayuresh Vivekanand Anand, Ehsan Ebrahimi Targhi, ...
IACR
2016
36views Biometrics» more  IACR 2016»
8 years 1 months ago
Bounding basis reduction properties
The paper describes improved analysis techniques for basis reduction that allow one to prove strong complexity bounds and reduced basis guarantees for traditional reduction algorit...
Arnold Neumaier
IACR
2016
45views Biometrics» more  IACR 2016»
8 years 1 months ago
Better Security for Functional Encryption for Inner Product Evaluations
Functional encryption is a new public key paradigm that solves, in a non-interactive way, most of the security challenges raised by cloud computing. A recent paper by Abdalla, Bou...
Michel Abdalla, Florian Bourse, Angelo De Caro, Da...
IACR
2016
35views Biometrics» more  IACR 2016»
8 years 1 months ago
Fully-Anonymous Short Dynamic Group Signatures Without Encryption
Abstract. Group signatures are an important privacy-enhancing tool which allow members of a group to anonymously produce signatures on behalf of the group. Ideally, group signature...
David Derler, Daniel Slamanig
IACR
2016
40views Biometrics» more  IACR 2016»
8 years 1 months ago
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security
Abstract. While threshold signature schemes have been presented before, there has never been an optimal threshold signature algorithm for DSA. Due to the properties of DSA, it is f...
Rosario Gennaro, Steven Goldfeder, Arvind Narayana...
IACR
2016
80views Biometrics» more  IACR 2016»
8 years 1 months ago
Collaborative Multi-Authority KP-ABE for Shorter Keys and Parameters
Bilinear groups are often used to create Attribute-Based Encryption (ABE) algorithms. In our proposal, a Multiple-Authorities Key-Policy Attribute-Based Encryption scheme is const...
Riccardo Longo, Chiara Marcolla, Massimiliano Sala
IACR
2016
47views Biometrics» more  IACR 2016»
8 years 1 months ago
The Honey Badger of BFT Protocols
The surprising success of cryptocurrencies has led to a surge of interest in deploying large scale, highly robust, Byzantine fault tolerant (BFT) protocols for mission-critical ap...
Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, Da...
IACR
2016
70views Biometrics» more  IACR 2016»
8 years 1 months ago
Optimizing S-box Implementations for Several Criteria using SAT Solvers
Abstract. We explore the feasibility of applying SAT solvers to optimizing implementations of small functions such as S-boxes for multiple optimization criteria, e.g., the number o...
Ko Stoffelen
IACR
2016
46views Biometrics» more  IACR 2016»
8 years 1 months ago
On Negation Complexity of Injections, Surjections and Collision-Resistance in Cryptography
Goldreich and Izsak (Theory of Computing, 2012) initiated the research on understanding the role of negations in circuits implementing cryptographic primitives, notably, consideri...
Douglas Miller, Adam Scrivener, Jesse Stern, Muthu...