138
click to vote
CRYPTO
15 years 7 months ago
2009 Springer
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
114
click to vote
CRYPTO
15 years 7 months ago
2009 Springer
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
CRYPTO
15 years 7 months ago
2009 Springer CRYPTO
15 years 7 months ago
2009 Springer
We prove the equivalence, up to a small polynomial approximation factor n/ log n, of the lattice problems uSVP (unique Shortest Vector Problem), BDD (Bounded Distance Decoding) and...
108
click to vote
CRYPTO
15 years 7 months ago
2009 Springer
We present the first signature scheme which is “short”, stateless and secure under the RSA assumption in the standard model. Prior short, standard model signatures in the RSA...
|