Fully,(almost) tightly secure IBE and dual system groups

J Chen, H Wee - Annual Cryptology Conference, 2013 - Springer
We present the first fully secure Identity-Based Encryption scheme (IBE) from the standard
assumptions where the security loss depends only on the security parameter and is …

Practical and tightly-secure digital signatures and authenticated key exchange

K Gjøsteen, T Jager - Advances in Cryptology–CRYPTO 2018: 38th …, 2018 - Springer
Tight security is increasingly gaining importance in real-world cryptography, as it allows to
choose cryptographic parameters in a way that is supported by a security proof, without the …

Subversion-resilient signature schemes

G Ateniese, B Magri, D Venturi - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
We provide a formal treatment of security of digital signatures against subversion attacks
(SAs). Our model of subversion generalizes previous work in several directions, and is …

On the impossibility of tight cryptographic reductions

C Bader, T Jager, Y Li, S Schäge - … on the Theory and Applications of …, 2016 - Springer
The existence of tight reductions in cryptographic security proofs is an important question,
motivated by the theoretical search for cryptosystems whose security guarantees are truly …

Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures

S Hohenberger, A Sahai, B Waters - … , Santa Barbara, CA, USA, August 18 …, 2013 - Springer
In this work, we explore building constructions with full domain hash structure, but with
standard model proofs that do not employ the random oracle heuristic. The launching point …

Unbounded ABE via bilinear entropy expansion, revisited

J Chen, J Gong, L Kowalczyk, H Wee - … on the Theory and Applications of …, 2018 - Springer
We present simpler and improved constructions of unbounded attribute-based encryption
(ABE) schemes with constant-size public parameters under static assumptions in bilinear …

Highly efficient key exchange protocols with optimal tightness

K Cohn-Gordon, C Cremers, K Gjøsteen… - Advances in Cryptology …, 2019 - Springer
In this paper we give nearly-tight reductions for modern implicitly authenticated Diffie-
Hellman protocols in the style of the Signal and Noise protocols, which are extremely simple …

Lattice-based signatures with tight adaptive corruptions and more

J Pan, B Wagner - IACR International Conference on Public-Key …, 2022 - Springer
We construct the first tightly secure signature schemes in the multi-user setting with adaptive
corruptions from lattices. In stark contrast to the previous tight constructions whose security is …

On proving equivalence class signatures secure from non-interactive assumptions

B Bauer, G Fuchsbauer, F Regen - IACR International Conference on …, 2024 - Springer
Equivalence class signatures (EQS), introduced by Hanser and Slamanig (AC'14, J.
Crypto'19), sign vectors of elements from a bilinear group. Their main feature is “adaptivity” …

New limits of provable security and applications to ElGamal encryption

S Schäge - Annual International Conference on the Theory and …, 2024 - Springer
We provide new results showing that ElGamal encryption cannot be proven CCA1-secure–a
long-standing open problem in cryptography. Our result follows from a very broad, meta …