Sciweavers

TCC
2010
Springer
381views Cryptology» more  TCC 2010»
15 years 10 months ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters
TCC
2010
Springer
324views Cryptology» more  TCC 2010»
15 years 10 months ago
Leakage-Resilient Signatures
The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. In practice, however, this notion can be insufficient due to ā€...
Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, G...
TCC
2010
Springer
303views Cryptology» more  TCC 2010»
15 years 10 months ago
Efficient Rational Secret Sharing in Standard Communication Networks
Georg Fuchsbauer, Jonathan Katz, David Naccache
TCC
2010
Springer
236views Cryptology» more  TCC 2010»
15 years 10 months ago
From Passive to Covert Security at Low Cost
Aumann and Lindell defined security against covert attacks, where the adversary is malicious, but is only caught cheating with a certain probability, where the idea is that in man...
Ivan Damgård, Martin Geisler, Jesper Buus Ni...
TCC
2010
Springer
231views Cryptology» more  TCC 2010»
15 years 10 months ago
A Domain Extender for the Ideal Cipher
We describe the first domain extender for ideal ciphers, i.e. we show a construction that is indifferentiable from a 2n-bit ideal cipher, given a n-bit ideal cipher. Our construc...
Jean-Sébastien Coron, Yevgeniy Dodis, Avrad...
Cryptology
Top of PageReset Settings