Lossy cryptography from code-based assumptions
Over the past few decades, we have seen a proliferation of advanced cryptographic
primitives with lossy or homomorphic properties built from various assumptions such as …
primitives with lossy or homomorphic properties built from various assumptions such as …
Multi-client functional encryption for linear functions in the standard model from LWE
B Libert, R Ţiţiu - International Conference on the Theory and …, 2019 - Springer
Multi-client functional encryption (MCFE) allows ℓ clients to encrypt ciphertexts (C _ t, 1, C _
t, 2, ..., C _ t, ℓ) under some label. Each client can encrypt his own data X_i for a label t using …
t, 2, ..., C _ t, ℓ) under some label. Each client can encrypt his own data X_i for a label t using …
LUNA: Quasi-Optimally Succinct Designated-Verifier Zero-Knowledge Arguments from Lattices
We introduce the first candidate Lattice-based designated verifier (DV) zero knowledge
sUccinct Non-interactive Argument (ZK-SNARG) protocol, named LUNA, with quasi-optimal …
sUccinct Non-interactive Argument (ZK-SNARG) protocol, named LUNA, with quasi-optimal …
Tighter security for generic authenticated key exchange in the QROM
We give a tighter security proof for authenticated key exchange (AKE) protocols that are
generically constructed from key encapsulation mechanisms (KEMs) in the quantum random …
generically constructed from key encapsulation mechanisms (KEMs) in the quantum random …
Compact Selective Opening Security from LWE
Selective opening (SO) security is a security notion for public-key encryption schemes that
captures security against adaptive corruptions of senders. SO security comes in chosen …
captures security against adaptive corruptions of senders. SO security comes in chosen …
All-but-many lossy trapdoor functions from lattices and applications
X Boyen, Q Li - Annual International Cryptology Conference, 2017 - Springer
Abstract “All-but-many lossy trapdoor functions”(ABM-LTF) are a powerful cryptographic
primitive studied by Hofheinz (Eurocrypt 2012). ABM-LTFs are parametrised with tags: a …
primitive studied by Hofheinz (Eurocrypt 2012). ABM-LTFs are parametrised with tags: a …
Adaptively secure constrained pseudorandom functions in the standard model
Constrained pseudorandom functions (CPRFs) allow learning “constrained” PRF keys that
can evaluate the PRF on a subset of the input space, or based on some predicate. First …
can evaluate the PRF on a subset of the input space, or based on some predicate. First …
Tighter security proofs for GPV-IBE in the quantum random oracle model
Abstract In (STOC, 2008), Gentry, Peikert, and Vaikuntanathan proposed the first identity-
based encryption (GPV-IBE) scheme based on a post-quantum assumption, namely, the …
based encryption (GPV-IBE) scheme based on a post-quantum assumption, namely, the …
Lattice-based authenticated key exchange with tight security
We construct the first tightly secure authenticated key exchange (AKE) protocol from lattices.
Known tight constructions are all based on Diffie-Hellman-like assumptions. Thus, our …
Known tight constructions are all based on Diffie-Hellman-like assumptions. Thus, our …
Compact and tightly selective-opening secure public-key encryption schemes
We propose four public-key encryption schemes with tight simulation-based selective-
opening security against chosen-ciphertext attacks (SIM-SO-CCA) in the random oracle …
opening security against chosen-ciphertext attacks (SIM-SO-CCA) in the random oracle …