164
click to vote
CRYPTO
15 years 10 months ago
2009 Springer
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
140
Voted
CRYPTO
15 years 10 months ago
2009 Springer
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
114
Voted
CRYPTO
15 years 10 months ago
2009 Springer 119
Voted
CRYPTO
15 years 10 months ago
2009 Springer
We prove the equivalence, up to a small polynomial approximation factor n/ log n, of the lattice problems uSVP (unique Shortest Vector Problem), BDD (Bounded Distance Decoding) and...
132
Voted
CRYPTO
15 years 10 months ago
2009 Springer
We present the first signature scheme which is “short”, stateless and secure under the RSA assumption in the standard model. Prior short, standard model signatures in the RSA...
|