Charm: a framework for rapidly prototyping cryptosystems
We describe Charm, an extensible framework for rapidly prototyping cryptographic systems.
Charm provides a number of features that explicitly support the development of new …
Charm provides a number of features that explicitly support the development of new …
Indistinguishability obfuscation from circular security
We show the existence of indistinguishability obfuscators (iO) for general circuits assuming
subexponential security of:(a) the Learning with Errors (LWE) assumption (with …
subexponential security of:(a) the Learning with Errors (LWE) assumption (with …
Obfuscating compute-and-compare programs under LWE
D Wichs, G Zirdelis - 2017 IEEE 58th Annual Symposium on …, 2017 - ieeexplore.ieee.org
We show how to obfuscate a large and expressive class of programs, which we call compute-
and-compare programs, under the learning-with-errors (LWE) assumption. Each such …
and-compare programs, under the learning-with-errors (LWE) assumption. Each such …
Implementing TLS with verified cryptographic security
TLS is possibly the most used protocol for secure communications, with a 18-year history of
flaws and fixes, ranging from its protocol logic to its cryptographic design, and from the …
flaws and fixes, ranging from its protocol logic to its cryptographic design, and from the …
Careful with composition: Limitations of the indifferentiability framework
We exhibit a hash-based storage auditing scheme which is provably secure in the random-
oracle model (ROM), but easily broken when one instead uses typical indifferentiable hash …
oracle model (ROM), but easily broken when one instead uses typical indifferentiable hash …
Lockable obfuscation
In this paper we introduce the notion of lockable obfuscation. In a lockable obfuscation
scheme there exists an obfuscation algorithm Obf that takes as input a security parameter, a …
scheme there exists an obfuscation algorithm Obf that takes as input a security parameter, a …
Key rotation for authenticated encryption
A common requirement in practice is to periodically rotate the keys used to encrypt stored
data. Systems used by Amazon and Google do so using a hybrid encryption technique …
data. Systems used by Amazon and Google do so using a hybrid encryption technique …
Proving the TLS handshake secure (as it is)
Abstract The TLS Internet Standard features a mixed bag of cryptographic algorithms and
constructions, letting clients and servers negotiate their use for each run of the handshake …
constructions, letting clients and servers negotiate their use for each run of the handshake …
Instantiating random oracles via UCEs
This paper provides a (standard-model) notion of security for (keyed) hash functions, called
UCE, that we show enables instantiation of random oracles (ROs) in a fairly broad and …
UCE, that we show enables instantiation of random oracles (ROs) in a fairly broad and …
On the security of the “free-XOR” technique
Yao's garbled-circuit approach enables constant-round secure two-party computation of any
function. In Yao's original construction, each gate in the circuit requires the parties to perform …
function. In Yao's original construction, each gate in the circuit requires the parties to perform …