Weak leakage-resilient client-side deduplication of encrypted data in cloud storage

J Xu, EC Chang, J Zhou - Proceedings of the 8th ACM SIGSAC …, 2013 - dl.acm.org
Recently, Halevi et al.(CCS'11) proposed a cryptographic primitive called proofs of
ownership (PoW) to enhance security of client-side deduplication in cloud storage. In a proof …

On the lattice isomorphism problem, quadratic forms, remarkable lattices, and cryptography

L Ducas, W van Woerden - Annual International Conference on the Theory …, 2022 - Springer
A natural and recurring idea in the knapsack/lattice cryptography literature is to start from a
lattice with remarkable decoding capability as your private key, and hide it somehow to …

Maximization of extractable randomness in a quantum random-number generator

JY Haw, SM Assad, AM Lance, NHY Ng, V Sharma… - Physical Review …, 2015 - APS
The generation of random numbers via quantum processes is an efficient and reliable
method to obtain true indeterministic random numbers that are of vital importance to …

Quietot: Lightweight oblivious transfer with a public-key setup

G Couteau, L Devadas, S Devadas, A Koch… - … Conference on the …, 2025 - Springer
Oblivious Transfer (OT) is at the heart of secure computation and is a foundation for many
applications in cryptography. Over two decades of work have led to extremely efficient …

Computational fuzzy extractors

B Fuller, X Meng, L Reyzin - Information and Computation, 2020 - Elsevier
Fuzzy extractors derive strong keys from noisy sources. Their security is usually defined
information-theoretically, with gaps between known negative results, existential …

Wave: A new family of trapdoor one-way preimage sampleable functions based on codes

T Debris-Alazard, N Sendrier, JP Tillich - … on the Theory and Application of …, 2019 - Springer
We present here a new family of trapdoor one-way functions that are Preimage Sampleable
on Average (PSA) based on codes, the Wave-PSA family. The trapdoor function is one-way …

Efficient fuzzy extraction of PUF-induced secrets: Theory and applications

J Delvaux, D Gu, I Verbauwhede, M Hiller… - … Hardware and Embedded …, 2016 - Springer
The device-unique response of a physically unclonable function (PUF) can serve as the root
of trust in an embedded cryptographic system. Fuzzy extractors transform this noisy non …

Collusion resistant traitor tracing from learning with errors

R Goyal, V Koppula, B Waters - Proceedings of the 50th Annual ACM …, 2018 - dl.acm.org
In this work we provide a traitor tracing construction with ciphertexts that grow polynomially
in log (n) where n is the number of users and prove it secure under the Learning with Errors …

Efficient and provable white-box primitives

PA Fouque, P Karpman, P Kirchner… - … Conference on the Theory …, 2016 - Springer
In recent years there have been several attempts to build white-box block ciphers whose
implementations aim to be incompressible. This includes the weak white-box ASASA …

Non-interactive zero-knowledge from non-interactive batch arguments

J Champion, DJ Wu - Annual International Cryptology Conference, 2023 - Springer
Zero-knowledge and succinctness are two important properties that arise in the study of non-
interactive arguments. Previously, Kitagawa et al.(TCC 2020) showed how to obtain a non …