Indistinguishability obfuscation from well-founded assumptions

A Jain, H Lin, A Sahai - Proceedings of the 53rd Annual ACM SIGACT …, 2021 - dl.acm.org
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …

Cryptographic group actions and applications

N Alamati, L De Feo, H Montgomery… - Advances in Cryptology …, 2020 - Springer
Isogeny-based assumptions have emerged as a viable option for quantum-secure
cryptography. Recent works have shown how to build efficient (public-key) primitives from …

The direction of updatable encryption does matter

R Nishimaki - IACR International Conference on Public-Key …, 2022 - Springer
We introduce a new definition for key updates, called backward-leak uni-directional key
updates, in updatable encryption (UE). This notion is a variant of uni-directional key updates …

Improving speed and security in updatable encryption schemes

D Boneh, S Eskandarian, S Kim, M Shih - … on the Theory and Application of …, 2020 - Springer
Periodic key rotation is a common practice designed to limit the long-term power of
cryptographic keys. Key rotation refers to the process of re-encrypting encrypted content …

Unidirectional updatable encryption and proxy re-encryption from DDH

P Miao, S Patranabis, G Watson - IACR International Conference on …, 2023 - Springer
Abstract Updatable Encryption (UE) and Proxy Re-encryption (PRE) allow re-encrypting a
ciphertext from one key to another in the symmetric-key and public-key settings, respectively …

Backward-leak uni-directional updatable encryption from (homomorphic) public key encryption

YJ Galteland, J Pan - Cryptology ePrint Archive, 2022 - eprint.iacr.org
The understanding of directionality for updatable encryption (UE) schemes is important, but
not yet completed in the literature. We show that security in the backward-leak uni …

[PDF][PDF] Unidirectional Updatable Encryption and Proxy Re-encryption from DDH or LWE.

P Miao, S Patranabis, GJ Watson - IACR Cryptol. ePrint Arch., 2022 - scholar.archive.org
Abstract Updatable Encryption (UE) and Proxy Re-encryption (PRE) allow re-encrypting a
ciphertext from one key to another in the symmetric-key and public-key settings, respectively …

New constructions of hinting PRGs, OWFs with encryption, and more

R Goyal, S Vusirikala, B Waters - … CRYPTO 2020, Santa Barbara, CA, USA …, 2020 - Springer
Over the last few years, there has been a surge of new cryptographic results, including
laconic oblivious transfer [13, 16],(anonymous/hierarchical) identity-based encryption [9] …

Byzantine Fault-Tolerant Aggregate Signatures

Q Kniep, R Wattenhofer - Proceedings of the 19th ACM Asia Conference …, 2024 - dl.acm.org
Efficient (non-interactive) aggregate signature schemes in the post-quantum setting are still
missing. We define the concept of Byzantine fault-tolerant aggregate signature schemes …

Combinatorially Homomorphic Encryption

Y Ishai, E Kushnir, RD Rothblum - Theory of Cryptography Conference, 2023 - Springer
Homomorphic encryption enables public computation over encrypted data. In the past few
decades, homomorphic encryption has become a staple of both the theory and practice of …