Survey on blockchain-based smart contracts: Technical aspects and future research
The industrial and computing research context revolutionized in various directions during
the last decades. The blockchain-based smart contract embraced as a significant research …
the last decades. The blockchain-based smart contract embraced as a significant research …
Message-locked encryption and secure deduplication
We formalize a new cryptographic primitive that we call Message-Locked Encryption (MLE),
where the key under which encryption and decryption are performed is itself derived from …
where the key under which encryption and decryption are performed is itself derived from …
[PDF][PDF] Mining your Ps and Qs: Detection of widespread weak keys in network devices
RSA and DSA can fail catastrophically when used with malfunctioning random number
generators, but the extent to which these problems arise in practice has never been …
generators, but the extent to which these problems arise in practice has never been …
CHURP: dynamic-committee proactive secret sharing
We introduce CHURP (CHUrn-Robust Proactive secret sharing). CHURP enables secure
secret-sharing in dynamic settings, where the committee of nodes storing a secret changes …
secret-sharing in dynamic settings, where the committee of nodes storing a secret changes …
Honey encryption: Security beyond the brute-force bound
We introduce honey encryption (HE), a simple, general approach to encrypting messages
using low min-entropy keys such as passwords. HE is designed to produce a ciphertext …
using low min-entropy keys such as passwords. HE is designed to produce a ciphertext …
Careful with composition: Limitations of the indifferentiability framework
We exhibit a hash-based storage auditing scheme which is provably secure in the random-
oracle model (ROM), but easily broken when one instead uses typical indifferentiable hash …
oracle model (ROM), but easily broken when one instead uses typical indifferentiable hash …
Message-locked encryption for lock-dependent messages
Motivated by the problem of avoiding duplication in storage systems, Bellare, Keelveedhi,
and Ristenpart have recently put forward the notion of Message-Locked Encryption (MLE) …
and Ristenpart have recently put forward the notion of Message-Locked Encryption (MLE) …
A systematic analysis of the Juniper Dual EC incident
In December 2015, Juniper Networks announced multiple security vulnerabilities stemming
from unauthorized code in ScreenOS, the operating system for their NetScreen VPN routers …
from unauthorized code in ScreenOS, the operating system for their NetScreen VPN routers …
Function-private identity-based encryption: Hiding the function in functional encryption
We put forward a new notion, function privacy, in identity-based encryption and, more
generally, in functional encryption. Intuitively, our notion asks that decryption keys reveal …
generally, in functional encryption. Intuitively, our notion asks that decryption keys reveal …
[PDF][PDF] When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography.
Random number generators (RNGs) are consistently a weak link in the secure use of
cryptography. Routine cryptographic operations such as encryption and signing can fail …
cryptography. Routine cryptographic operations such as encryption and signing can fail …