Showing 1 - 20 results of 80 for search '"Eurocrypt"', query time: 0.09s Refine Results
  1. 1
  2. 2
  3. 3

    Statistical zapr arguments from bilinear maps

    Published 2021
    “…Our construction relies on a combination of several tools, including the Groth-Ostrovsky-Sahai NIZK and NIWI [EUROCRYPT ’06, CRYPTO ’06, JACM ’12], “sometimes-binding statistically hiding commitments” [Kalai-Khurana-Sahai, EUROCRYPT ’18] and the “MPC-in-the-head” technique [Ishai-Kushilevitz-Ostrovsky-Sahai, STOC ’07].…”
    Get full text
    Article
  4. 4

    Statistical zapr arguments from bilinear maps by Lombardi, Alex, Vaikuntanathan, Vinod, Wichs, Daniel

    Published 2022
    “…Our construction relies on a combination of several tools, including the Groth-Ostrovsky-Sahai NIZK and NIWI [EUROCRYPT ’06, CRYPTO ’06, JACM ’12], “sometimes-binding statistically hiding commitments” [Kalai-Khurana-Sahai, EUROCRYPT ’18] and the “MPC-in-the-head” technique [Ishai-Kushilevitz-Ostrovsky-Sahai, STOC ’07].…”
    Get full text
    Article
  5. 5
  6. 6

    Diving deep into the preimage security of AES-like hashing by Chen, Shiyao, Guo, Jian, List, Eik, Shi, Danping, Zhang, Tianyu

    Published 2024
    “…Since the seminal works by Sasaki and Aoki, Meet-in-the-Middle (MITM) attacks are recognized as an effective technique for preimage and collision attacks on hash functions. At Eurocrypt 2021, Bao et al. automated MITM attacks on AES-like hashing and improved upon the best manual result. …”
    Get full text
    Conference Paper
  7. 7

    A CP-ABE Scheme Based on Lattice LWE and Its Security Analysis by Yunfei Yao, Huiyan Chen, Linzhi Shen, Ke Wang, Qingnan Wang

    Published 2023-07-01
    “…Technically, we use the new lattice two-stage sampling technique of Lai, Liu, and Wang (EUROCRYPT 2021) in the key generation phase instead of the extended trapdoor sampling technique. …”
    Get full text
    Article
  8. 8
  9. 9

    Private Constrained PRFs (and More) from LWE by Brakerski, Zvika, Tsabary, Rotem, Vaikuntanathan, Vinod, Wee, Hoeteck

    Published 2021
    “…Boneh, Kim and Montgomery (EUROCRYPT 2017) recently presented a construction of private constrained PRF for point function constraints, and Canetti and Chen (EUROCRYPT 2017) presented a completely different construction for more general NC1 constraints. …”
    Get full text
    Article
  10. 10

    Fully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problem by Aung, Khin Mi Mi, Lee, Hyung Tae, Tan, Benjamin Hong Meng, Wang, Huaxiong

    Published 2020
    “…To that end, we provide a natural extension of the somewhat homomorphic encryption (SHE) scheme over the integers proposed by Cheon and Stehlé (Eurocrypt 2015) to support non-binary plaintexts. Then, a novel bootstrapping algorithm is proposed for this extended SHE scheme by introducing generalizations of several functions in binary arithmetic. …”
    Get full text
    Journal Article
  11. 11

    Reusable Fuzzy Extractors for Low-Entropy Distributions by Canetti, Ran, Fuller, Benjamin, Paneth, Omer, Reyzin, Leonid, Smith, Adam

    Published 2020
    “…Fuzzy extractors (Dodis et al., in Advances in cryptology—EUROCRYPT 2014, Springer, Berlin, 2014, pp 93–110) convert repeated noisy readings of a secret into the same uniformly distributed key. …”
    Get full text
    Article
  12. 12

    Algebraic manipulation detection codes by Cramer, Ronald, Fehr, Serge, Padró, Carles

    Published 2013
    “…Algebraic manipulation detection codes are a cryptographic primitive that was introduced by Cramer et al. (Eurocrypt 2008). It encompasses several methods that were previously used in cheater detection in secret sharing. …”
    Get full text
    Get full text
    Journal Article
  13. 13
  14. 14

    Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs by Lombardi, Alex, Vaikuntanathan, Vinod

    Published 2021
    “…As a corollary (following Choudhuri et al., ePrint 2019 and Ephraim et al., EUROCRYPT 2020), we construct hard-on-average problems in the complexity class (Formula Presented) under the (Formula Presented)-hardness of the repeated squaring problem and the (Formula Presented)-hardness of the learning with errors problem. …”
    Get full text
    Book
  15. 15

    Improved security analysis of PMAC by Nandi Mridul, Mandal Avradip

    Published 2008-07-01
    “…In the original paper of PMAC by Black and Rogaway in Eurocrypt-2002, the bound was shown to be (σ + 1)2/2n–1. …”
    Get full text
    Article
  16. 16

    A TWOOA construction for multi-receiver multi-message authentication codes by Fuji-Hara Ryoh, Li Xiyang, Miao Ying, Wu Dianhua

    Published 2008-04-01
    “…In this paper, we generalize the notion of a TWOOA, and then use this generalized TWOOA to construct a (k, n; w) multi-receiver multi-message authentication code, which exceeds that of Safavi-Naini and Wang [Proc. of Eurocrypt'98, LNCS 1403, Springer (1998), pp. 527–541] at least in the numbers of receivers and authenticated messages. …”
    Get full text
    Article
  17. 17

    Lattice-Based Logarithmic-Size Non-Interactive Deniable Ring Signatures by Huiwen Jia, Chunming Tang, Yanhua Zhang

    Published 2021-07-01
    “…From a high level, we adapt Libert et al.’s zero-knowledge argument system (Eurocrypt 2016) to allow the prover to convince the verifier that its witness satisfies an additional condition. …”
    Get full text
    Article
  18. 18

    Lattices in constructions of dense sphere packings and certain cryptographic schemes by Cheng, Shantian

    Published 2016
    “…We present an RIBE scheme from lattices by combining two Agrawal et al.’s IBE schemes (Eurocrypt 2010) with the subset difference method. …”
    Get full text
    Thesis
  19. 19

    Improved related‐tweakey rectangle attacks on round‐reduced Deoxys‐BC by Jiamei Liu, Lin Tan, Hong Xu

    Published 2023-05-01
    “…Under the new related‐key rectangle attack framework proposed by Dong et al. in EUROCRYPT 2022, we present three kinds of precomputed tables to further reduce the time complexity in the key‐recovery phase. …”
    Get full text
    Article
  20. 20

    An Approach to the Construction of a Recursive Argument of Polynomial Evaluation in the Discrete Log Setting by Sungwook Kim

    Published 2022-01-01
    “…Bünz et al. recently presented a novel polynomial commitment scheme with no trusted setup in Eurocrypt’20. To provide a transparent setup, their scheme is built over an ideal class group of imaginary quadratic fields (or briefly, class group). …”
    Get full text
    Article