Lossy cryptography from code-based assumptions

Q Dao, A Jain - Annual International Cryptology Conference, 2024 - Springer
Over the past few decades, we have seen a proliferation of advanced cryptographic
primitives with lossy or homomorphic properties built from various assumptions such as …

Multi-client functional encryption for linear functions in the standard model from LWE

B Libert, R Ţiţiu - International Conference on the Theory and …, 2019 - Springer
Multi-client functional encryption (MCFE) allows ℓ clients to encrypt ciphertexts (C _ t, 1, C _
t, 2, ..., C _ t, ℓ) under some label. Each client can encrypt his own data X_i for a label t using …

LUNA: Quasi-Optimally Succinct Designated-Verifier Zero-Knowledge Arguments from Lattices

R Steinfeld, A Sakzad, MF Esgin, V Kuchta… - Proceedings of the …, 2024 - dl.acm.org
We introduce the first candidate Lattice-based designated verifier (DV) zero knowledge
sUccinct Non-interactive Argument (ZK-SNARG) protocol, named LUNA, with quasi-optimal …

Tighter security for generic authenticated key exchange in the QROM

J Pan, B Wagner, R Zeng - International Conference on the Theory and …, 2023 - Springer
We give a tighter security proof for authenticated key exchange (AKE) protocols that are
generically constructed from key encapsulation mechanisms (KEMs) in the quantum random …

Compact Selective Opening Security from LWE

D Hofheinz, K Hostáková, J Kastner, K Klein… - … Conference on Public …, 2024 - Springer
Selective opening (SO) security is a security notion for public-key encryption schemes that
captures security against adaptive corruptions of senders. SO security comes in chosen …

All-but-many lossy trapdoor functions from lattices and applications

X Boyen, Q Li - Annual International Cryptology Conference, 2017 - Springer
Abstract “All-but-many lossy trapdoor functions”(ABM-LTF) are a powerful cryptographic
primitive studied by Hofheinz (Eurocrypt 2012). ABM-LTFs are parametrised with tags: a …

Adaptively secure constrained pseudorandom functions in the standard model

A Davidson, S Katsumata, R Nishimaki… - Annual International …, 2020 - Springer
Constrained pseudorandom functions (CPRFs) allow learning “constrained” PRF keys that
can evaluate the PRF on a subset of the input space, or based on some predicate. First …

Tighter security proofs for GPV-IBE in the quantum random oracle model

S Katsumata, S Yamada, T Yamakawa - … on the Theory and Application of …, 2018 - Springer
Abstract In (STOC, 2008), Gentry, Peikert, and Vaikuntanathan proposed the first identity-
based encryption (GPV-IBE) scheme based on a post-quantum assumption, namely, the …

Lattice-based authenticated key exchange with tight security

J Pan, B Wagner, R Zeng - Annual International Cryptology Conference, 2023 - Springer
We construct the first tightly secure authenticated key exchange (AKE) protocol from lattices.
Known tight constructions are all based on Diffie-Hellman-like assumptions. Thus, our …

Compact and tightly selective-opening secure public-key encryption schemes

J Pan, R Zeng - International Conference on the Theory and …, 2022 - Springer
We propose four public-key encryption schemes with tight simulation-based selective-
opening security against chosen-ciphertext attacks (SIM-SO-CCA) in the random oracle …