Redactable blockchain–or–rewriting history in bitcoin and friends
We put forward a new framework that makes it possible to re-write or compress the content
of any number of blocks in decentralized services exploiting the blockchain technology. As …
of any number of blocks in decentralized services exploiting the blockchain technology. As …
Fully homomorphic encryption over the integers
We construct a simple fully homomorphic encryption scheme, using only elementary
modular arithmetic. We use Gentry's technique to construct a fully homomorphic scheme …
modular arithmetic. We use Gentry's technique to construct a fully homomorphic scheme …
Key homomorphic PRFs and their applications
A pseudorandom function F:\mathcalK*\mathcalX→\mathcalY is said to be key homomorphic
if given F (k 1, x) and F (k 2, x) there is an efficient algorithm to compute F (k 1⊕ k 2, x) …
if given F (k 1, x) and F (k 2, x) there is an efficient algorithm to compute F (k 1⊕ k 2, x) …
An algebraic framework for Diffie–Hellman assumptions
We put forward a new algebraic framework to generalize and analyze Diffie–Hellman like
decisional assumptions which allows us to argue about security and applications by …
decisional assumptions which allows us to argue about security and applications by …
Secure integration of asymmetric and symmetric encryption schemes
E Fujisaki, T Okamoto - Journal of cryptology, 2013 - Springer
This paper presents a generic conversion from weak asymmetric and symmetric encryption
schemes to an asymmetric encryption scheme that is chosen-ciphertext secure in the …
schemes to an asymmetric encryption scheme that is chosen-ciphertext secure in the …
Information theoretic security
The topic of information theoretic security is introduced and the principal results in this area
are reviewed. The basic wire-tap channel model is considered first, and then several specific …
are reviewed. The basic wire-tap channel model is considered first, and then several specific …
Lossy trapdoor functions and their applications
We propose a new general primitive called lossy trapdoor functions (lossy TDFs), and
realize it under a variety of different number theoretic assumptions, including hardness of the …
realize it under a variety of different number theoretic assumptions, including hardness of the …
Batch Arguments for and More from Standard Bilinear Group Assumptions
Non-interactive batch arguments for NP provide a way to amortize the cost of NP verification
across multiple instances. They enable a prover to convince a verifier of multiple NP …
across multiple instances. They enable a prover to convince a verifier of multiple NP …
Stream ciphers: A practical solution for efficient homomorphic-ciphertext compression
In typical applications of homomorphic encryption, the first step consists for Alice of
encrypting some plaintext m under Bob's public key pk pk and of sending the ciphertext c …
encrypting some plaintext m under Bob's public key pk pk and of sending the ciphertext c …
Probabilistic public key encryption with equality test
We present a (probabilistic) public key encryption (PKE) scheme such that when being
implemented in a bilinear group, anyone is able to check whether two ciphertexts are …
implemented in a bilinear group, anyone is able to check whether two ciphertexts are …