Indistinguishability obfuscation from well-founded assumptions
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …
programs into unintelligible ones while preserving functionality. It is a fascinating and …
Cryptographic group actions and applications
N Alamati, L De Feo, H Montgomery… - Advances in Cryptology …, 2020 - Springer
Isogeny-based assumptions have emerged as a viable option for quantum-secure
cryptography. Recent works have shown how to build efficient (public-key) primitives from …
cryptography. Recent works have shown how to build efficient (public-key) primitives from …
The direction of updatable encryption does matter
R Nishimaki - IACR International Conference on Public-Key …, 2022 - Springer
We introduce a new definition for key updates, called backward-leak uni-directional key
updates, in updatable encryption (UE). This notion is a variant of uni-directional key updates …
updates, in updatable encryption (UE). This notion is a variant of uni-directional key updates …
Improving speed and security in updatable encryption schemes
Periodic key rotation is a common practice designed to limit the long-term power of
cryptographic keys. Key rotation refers to the process of re-encrypting encrypted content …
cryptographic keys. Key rotation refers to the process of re-encrypting encrypted content …
Unidirectional updatable encryption and proxy re-encryption from DDH
Abstract Updatable Encryption (UE) and Proxy Re-encryption (PRE) allow re-encrypting a
ciphertext from one key to another in the symmetric-key and public-key settings, respectively …
ciphertext from one key to another in the symmetric-key and public-key settings, respectively …
Backward-leak uni-directional updatable encryption from (homomorphic) public key encryption
YJ Galteland, J Pan - Cryptology ePrint Archive, 2022 - eprint.iacr.org
The understanding of directionality for updatable encryption (UE) schemes is important, but
not yet completed in the literature. We show that security in the backward-leak uni …
not yet completed in the literature. We show that security in the backward-leak uni …
[PDF][PDF] Unidirectional Updatable Encryption and Proxy Re-encryption from DDH or LWE.
Abstract Updatable Encryption (UE) and Proxy Re-encryption (PRE) allow re-encrypting a
ciphertext from one key to another in the symmetric-key and public-key settings, respectively …
ciphertext from one key to another in the symmetric-key and public-key settings, respectively …
New constructions of hinting PRGs, OWFs with encryption, and more
Over the last few years, there has been a surge of new cryptographic results, including
laconic oblivious transfer [13, 16],(anonymous/hierarchical) identity-based encryption [9] …
laconic oblivious transfer [13, 16],(anonymous/hierarchical) identity-based encryption [9] …
Byzantine Fault-Tolerant Aggregate Signatures
Q Kniep, R Wattenhofer - Proceedings of the 19th ACM Asia Conference …, 2024 - dl.acm.org
Efficient (non-interactive) aggregate signature schemes in the post-quantum setting are still
missing. We define the concept of Byzantine fault-tolerant aggregate signature schemes …
missing. We define the concept of Byzantine fault-tolerant aggregate signature schemes …
Combinatorially Homomorphic Encryption
Homomorphic encryption enables public computation over encrypted data. In the past few
decades, homomorphic encryption has become a staple of both the theory and practice of …
decades, homomorphic encryption has become a staple of both the theory and practice of …