Sciweavers

ASIACRYPT
2015
Springer
8 years 9 days ago
Implementing Candidate Graded Encoding Schemes from Ideal Lattices
Multilinear maps have become popular tools for designing cryptographic schemes since a first approximate realisation candidate was proposed by Garg, Gentry and Halevi (GGH). This ...
Martin R. Albrecht, Catalin Cocis, Fabien Laguilla...
ASIACRYPT
2015
Springer
8 years 9 days ago
Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security
Michel Abdalla, Fabrice Benhamouda, Alain Passel&e...
ASIACRYPT
2015
Springer
8 years 9 days ago
Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation
Abstract. Existing protocols for non-interactive multi-party key exchange either (1) support a bounded number of users, (2) require a trusted setup, or (3) rely on knowledge-type a...
Dakshita Khurana, Vanishree Rao, Amit Sahai
ASIACRYPT
2015
Springer
8 years 9 days ago
Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware
In May 2012, a highly advanced malware for espionage dubbed Flame was found targeting the Middle-East. As it turned out, it used a forged signature to infect Windows machines by MI...
Max Fillinger, Marc Stevens
ASIACRYPT
2015
Springer
8 years 9 days ago
Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
We provide a security analysis for full-state keyed Sponge and full-state Duplex constructions. Our results can be used for making a large class of Sponge-based authenticated encry...
Bart Mennink, Reza Reyhanitabar, Damian Vizá...
ASIACRYPT
2015
Springer
8 years 9 days ago
New Circular Security Counterexamples from Decision Linear and Learning with Errors
We investigate new constructions of n-circular counterexamples with a focus on the case of n = 2. We have a particular interest in what qualities a cryptosystem must have to be ab...
Allison Bishop, Susan Hohenberger, Brent Waters
ASIACRYPT
2015
Springer
8 years 9 days ago
QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions
Abstract. A sequence of recent works have constructed constant-size quasi-adaptive (QA) NIZK arguments of membership in linear subspaces of ˆGm , where ˆG is a group equipped wit...
Alonso González, Alejandro Hevia, Carla R&a...
ASIACRYPT
2015
Springer
8 years 9 days ago
Type 2 Structure-Preserving Signature Schemes Revisited
At CRYPTO 2014, Abe et al. presented generic-signer structure-preserving signature schemes using Type 2 pairings. According to the authors, the proposed constructions are optimal w...
Sanjit Chatterjee, Alfred Menezes
ASIACRYPT
2015
Springer
8 years 9 days ago
A Framework for Identity-Based Encryption with Almost Tight Security
We show a framework for constructing identity-based encryption (IBE) schemes that are (almost) tightly secure in the multi-challenge and multi-instance setting. In particular, we ...
Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yam...
ASIACRYPT
2015
Springer
8 years 9 days ago
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
Differential and linear cryptanalysis are the general purpose tools to analyze various cryptographic primitives. Both techniques have in common that they rely on the existence of ...
Christoph Dobraunig, Maria Eichlseder, Florian Men...