Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Fully,(almost) tightly secure IBE and dual system groups
We present the first fully secure Identity-Based Encryption scheme (IBE) from the standard
assumptions where the security loss depends only on the security parameter and is …
assumptions where the security loss depends only on the security parameter and is …
Practical and tightly-secure digital signatures and authenticated key exchange
Tight security is increasingly gaining importance in real-world cryptography, as it allows to
choose cryptographic parameters in a way that is supported by a security proof, without the …
choose cryptographic parameters in a way that is supported by a security proof, without the …
Subversion-resilient signature schemes
We provide a formal treatment of security of digital signatures against subversion attacks
(SAs). Our model of subversion generalizes previous work in several directions, and is …
(SAs). Our model of subversion generalizes previous work in several directions, and is …
On the impossibility of tight cryptographic reductions
The existence of tight reductions in cryptographic security proofs is an important question,
motivated by the theoretical search for cryptosystems whose security guarantees are truly …
motivated by the theoretical search for cryptosystems whose security guarantees are truly …
Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures
In this work, we explore building constructions with full domain hash structure, but with
standard model proofs that do not employ the random oracle heuristic. The launching point …
standard model proofs that do not employ the random oracle heuristic. The launching point …
Unbounded ABE via bilinear entropy expansion, revisited
We present simpler and improved constructions of unbounded attribute-based encryption
(ABE) schemes with constant-size public parameters under static assumptions in bilinear …
(ABE) schemes with constant-size public parameters under static assumptions in bilinear …
Highly efficient key exchange protocols with optimal tightness
In this paper we give nearly-tight reductions for modern implicitly authenticated Diffie-
Hellman protocols in the style of the Signal and Noise protocols, which are extremely simple …
Hellman protocols in the style of the Signal and Noise protocols, which are extremely simple …
Lattice-based signatures with tight adaptive corruptions and more
We construct the first tightly secure signature schemes in the multi-user setting with adaptive
corruptions from lattices. In stark contrast to the previous tight constructions whose security is …
corruptions from lattices. In stark contrast to the previous tight constructions whose security is …
On proving equivalence class signatures secure from non-interactive assumptions
B Bauer, G Fuchsbauer, F Regen - IACR International Conference on …, 2024 - Springer
Equivalence class signatures (EQS), introduced by Hanser and Slamanig (AC'14, J.
Crypto'19), sign vectors of elements from a bilinear group. Their main feature is “adaptivity” …
Crypto'19), sign vectors of elements from a bilinear group. Their main feature is “adaptivity” …
New limits of provable security and applications to ElGamal encryption
S Schäge - Annual International Conference on the Theory and …, 2024 - Springer
We provide new results showing that ElGamal encryption cannot be proven CCA1-secure–a
long-standing open problem in cryptography. Our result follows from a very broad, meta …
long-standing open problem in cryptography. Our result follows from a very broad, meta …