搜索结果: 1-15 共查到“Primitives”相关记录64条 . 查询时间(0.062 秒)
Security of Symmetric Primitives against Key-Correlated Attacks
Key-correlated attack related-key attack key-dependent-message attack
2019/9/5
We study the security of symmetric primitives against key-correlated attacks (KCA), whereby an adversary can arbitrarily correlate keys, messages, and ciphertexts. Security against KCA is required whe...
Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree
Block cipher Cryptanalysis Interpolation attack
2019/7/15
Symmetric cryptographic primitives with low multiplicative complexity have been proposed to improve the performance of emerging applications such as secure Multi-Party Computation. However, primitives...
A software watermarking scheme enables users to embed a message or mark within a program while preserving its functionality. Moreover, it is difficult for an adversary to remove a watermark from a mar...
New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning
MPC Decision Trees SVM
2019/6/3
At CRYPTO 2018 Cramer et al. presented SPDZ2k, a new secret-sharing based protocol for actively secure multi-party computation against a dishonest majority, that works over rings instead of fields. Th...
Securely managing encrypted data on an untrusted party is a challenging problem that has motivated the study of a variety of cryptographic primitives. A special class of such primitives allows an untr...
New Number-Theoretic Cryptographic Primitives
rth-power residue symbol rth-order imprint prq moduli
2019/5/14
This paper introduces new p^rq-based one-way functions and companion signature schemes. The new signature schemes are interesting because they do not belong to the two common design blueprints, which ...
Efficient Symmetric Primitives for Advanced Cryptographic Protocols (A Marvellous Contribution)
Vision Rescue Marvellous
2019/4/28
While common symmetric primitives like the AES and SHA3 are optimized for efficient hardware and software implementations, a range of emerging applications using advanced cryptographic protocols such ...
MARVELlous: a STARK-Friendly Family of Cryptographic Primitives
cryptanalysis block ciphers hash functions
2018/11/16
The ZK-STARK technology, published by Ben-Sasson et al. in ePrint 2018/046 is hailed by many as being a viable, efficient solution to the scaling problem of cryptocurrencies. In essence, a ZK-STARK pr...
Bidirectional Asynchronous Ratcheted Key Agreement without Key-Update Primitives
secure communication post-compromise security ratchet
2018/11/9
Following up mass surveillance and privacy issues, modern secure communication protocols now seek for more security such as forward secrecy and post-compromise security. They cannot rely on any assump...
On Tightly Secure Primitives in the Multi-Instance Setting
Tight reductions Primitives Reductions
2018/11/6
We initiate the study of general tight reductions in cryptography. There already exist a variety of works that offer tight reductions for a number of cryptographic tasks, ranging from encryption and s...
Towards Lightweight Cryptographic Primitives with Built-in Fault-Detection
design of cryptographic primitives fault injection countermeasures side-channel attack
2018/8/10
We introduce a novel approach for designing symmetric ciphers to resist fault injection. The approach is fairly generic and applies to round functions of block ciphers, cryptographic permutations and ...
Simpler Constructions of Asymmetric Primitives from Obfuscation
obfuscation public-key encryption identity-based encryption
2018/6/7
We revisit constructions of asymmetric primitives from obfuscation and give simpler alternatives. We consider public-key encryption, (hierarchical) identity-based encryption ((H)IBE), and predicate en...
Post-Quantum Group Signatures from Symmetric Primitives
Post-Quantum Group Signatures Symmetric Primitives
2018/3/12
Group signatures are used extensively for privacy in anonymous credentials schemes and in real-world systems for hardware enclave attestation. As such, there is a strong interest in making these schem...
On the Bit Security of Cryptographic Primitives
Bit Security Information Theory Indistinguishability
2018/1/19
We introduce a formal quantitative notion of ``bit security'' for a general type of cryptographic games (capturing both decision and search problems), aimed at capturing the intuition that a cryptogra...
Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives
privacy-preserving cryptography provable security accumulator
2017/11/29
In this paper we address the construction of privacy-friendly cryptographic primitives for the post-quantum era and in particular accumulators with zero-knowledge membership proofs and ring signatures...