-
1
-
2
-
3
Statistical zapr arguments from bilinear maps
Published 2021“…Our construction relies on a combination of several tools, including the Groth-Ostrovsky-Sahai NIZK and NIWI [EUROCRYPT ’06, CRYPTO ’06, JACM ’12], “sometimes-binding statistically hiding commitments” [Kalai-Khurana-Sahai, EUROCRYPT ’18] and the “MPC-in-the-head” technique [Ishai-Kushilevitz-Ostrovsky-Sahai, STOC ’07].…”
Get full text
Article -
4
Statistical zapr arguments from bilinear maps
Published 2022“…Our construction relies on a combination of several tools, including the Groth-Ostrovsky-Sahai NIZK and NIWI [EUROCRYPT ’06, CRYPTO ’06, JACM ’12], “sometimes-binding statistically hiding commitments” [Kalai-Khurana-Sahai, EUROCRYPT ’18] and the “MPC-in-the-head” technique [Ishai-Kushilevitz-Ostrovsky-Sahai, STOC ’07].…”
Get full text
Article -
5
-
6
Diving deep into the preimage security of AES-like hashing
Published 2024“…Since the seminal works by Sasaki and Aoki, Meet-in-the-Middle (MITM) attacks are recognized as an effective technique for preimage and collision attacks on hash functions. At Eurocrypt 2021, Bao et al. automated MITM attacks on AES-like hashing and improved upon the best manual result. …”
Get full text
Conference Paper -
7
A CP-ABE Scheme Based on Lattice LWE and Its Security Analysis
Published 2023-07-01“…Technically, we use the new lattice two-stage sampling technique of Lai, Liu, and Wang (EUROCRYPT 2021) in the key generation phase instead of the extended trapdoor sampling technique. …”
Get full text
Article -
8
Automatic search of Meet-in-the-Middle preimage attacks on AES-like hashing
Published 2022Get full text
Conference Paper -
9
Private Constrained PRFs (and More) from LWE
Published 2021“…Boneh, Kim and Montgomery (EUROCRYPT 2017) recently presented a construction of private constrained PRF for point function constraints, and Canetti and Chen (EUROCRYPT 2017) presented a completely different construction for more general NC1 constraints. …”
Get full text
Article -
10
Fully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problem
Published 2020“…To that end, we provide a natural extension of the somewhat homomorphic encryption (SHE) scheme over the integers proposed by Cheon and Stehlé (Eurocrypt 2015) to support non-binary plaintexts. Then, a novel bootstrapping algorithm is proposed for this extended SHE scheme by introducing generalizations of several functions in binary arithmetic. …”
Get full text
Journal Article -
11
Reusable Fuzzy Extractors for Low-Entropy Distributions
Published 2020“…Fuzzy extractors (Dodis et al., in Advances in cryptology—EUROCRYPT 2014, Springer, Berlin, 2014, pp 93–110) convert repeated noisy readings of a secret into the same uniformly distributed key. …”
Get full text
Article -
12
Algebraic manipulation detection codes
Published 2013“…Algebraic manipulation detection codes are a cryptographic primitive that was introduced by Cramer et al. (Eurocrypt 2008). It encompasses several methods that were previously used in cheater detection in secret sharing. …”
Get full text
Get full text
Journal Article -
13
Towards breaking the exponential barrier for general secret sharing
Published 2020Get full text
Article -
14
Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs
Published 2021“…As a corollary (following Choudhuri et al., ePrint 2019 and Ephraim et al., EUROCRYPT 2020), we construct hard-on-average problems in the complexity class (Formula Presented) under the (Formula Presented)-hardness of the repeated squaring problem and the (Formula Presented)-hardness of the learning with errors problem. …”
Get full text
Book -
15
Improved security analysis of PMAC
Published 2008-07-01“…In the original paper of PMAC by Black and Rogaway in Eurocrypt-2002, the bound was shown to be (σ + 1)2/2n–1. …”
Get full text
Article -
16
A TWOOA construction for multi-receiver multi-message authentication codes
Published 2008-04-01“…In this paper, we generalize the notion of a TWOOA, and then use this generalized TWOOA to construct a (k, n; w) multi-receiver multi-message authentication code, which exceeds that of Safavi-Naini and Wang [Proc. of Eurocrypt'98, LNCS 1403, Springer (1998), pp. 527–541] at least in the numbers of receivers and authenticated messages. …”
Get full text
Article -
17
Lattice-Based Logarithmic-Size Non-Interactive Deniable Ring Signatures
Published 2021-07-01“…From a high level, we adapt Libert et al.’s zero-knowledge argument system (Eurocrypt 2016) to allow the prover to convince the verifier that its witness satisfies an additional condition. …”
Get full text
Article -
18
Lattices in constructions of dense sphere packings and certain cryptographic schemes
Published 2016“…We present an RIBE scheme from lattices by combining two Agrawal et al.’s IBE schemes (Eurocrypt 2010) with the subset difference method. …”
Get full text
Thesis -
19
Improved related‐tweakey rectangle attacks on round‐reduced Deoxys‐BC
Published 2023-05-01“…Under the new related‐key rectangle attack framework proposed by Dong et al. in EUROCRYPT 2022, we present three kinds of precomputed tables to further reduce the time complexity in the key‐recovery phase. …”
Get full text
Article -
20
An Approach to the Construction of a Recursive Argument of Polynomial Evaluation in the Discrete Log Setting
Published 2022-01-01“…Bünz et al. recently presented a novel polynomial commitment scheme with no trusted setup in Eurocrypt’20. To provide a transparent setup, their scheme is built over an ideal class group of imaginary quadratic fields (or briefly, class group). …”
Get full text
Article