Sciweavers

PKC
2016
Springer
58views Cryptology» more  PKC 2016»
10 years 21 days ago
Deniable Functional Encryption
Deniable encryption, first introduced by Canetti et al. (CRYPTO 1997), allows a sender and/or receiver of encrypted communication to produce fake but authentic-looking coins and/o...
Angelo De Caro, Vincenzo Iovino, Adam O'Neill
PKC
2016
Springer
71views Cryptology» more  PKC 2016»
10 years 21 days ago
Chosen-Ciphertext Security from Subset Sum
We construct a public-key encryption (PKE) scheme whose security is polynomial-time equivalent to the hardness of the Subset Sum problem. Our scheme achieves the standard notion of...
Sebastian Faust, Daniel Masny, Daniele Venturi
PKC
2016
Springer
55views Cryptology» more  PKC 2016»
10 years 21 days ago
Universally Composable Direct Anonymous Attestation
Direct Anonymous Attestation (DAA) is one of the most complex cryptographic algorithms that has been deployed in practice. In spite of this, and the long body of work on the subjec...
Jan Camenisch, Manu Drijvers, Anja Lehmann
PKC
2016
Springer
63views Cryptology» more  PKC 2016»
10 years 21 days ago
Degenerate Curve Attacks - Extending Invalid Curve Attacks to Edwards Curves and Other Models
Abstract Invalid curve attacks are a well-known class of attacks against implementations of elliptic curve cryptosystems, in which an adversary tricks the cryptographic device into...
Samuel Neves, Mehdi Tibouchi
PIEEE
2016
58views more  PIEEE 2016»
10 years 21 days ago
Reconstructing Time-Dependent Dynamics
—The usefulness of the information contained in biomedical data relies heavily on the reliability and accuracy of the methods used for its extraction. The conventional assumption...
Philip T. Clemson, Gemma Lancaster, Aneta Stefanov...