scispace - formally typeset
Book ChapterDOI

Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model

TLDR
The proposed constructions are the first of its kind under coding-based assumption in the standard model that do not use the \(\kappa \)-repetition paradigm initiated by Rosen and Segev at Theory of Cryptography Conference (TCC), 2009.
Abstract
In this paper, we propose an IND-CCA2 secure Key-Encapsulation (KEM) in the standard model using the Niederreiter Encryption scheme. Also, we propose a PRIV-1CCA secure deterministic variant of the Niederreiter encryption scheme in the standard model. The security of these constructions are reduced to the hardness of the Syndrome Decoding problem and the Goppa Code Distinguishability problem. To the best of our knowledge, the proposed constructions are the first of its kind under coding-based assumption in the standard model that do not use the \(\kappa \)-repetition paradigm initiated by Rosen and Segev at Theory of Cryptography Conference (TCC), 2009.

read more

Citations
More filters
Book

Advances in cryptology -- EUROCRYPT 2010 : 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30-June 3, 2010 : proceedings

Henri Gilbert
TL;DR: Cryptosystems I and II: Cryptography between Wonderland and Underland as discussed by the authors, a simple BGN-type Cryptosystem from LWE, or Bonsai Trees, or how to delegate a Lattice Basis.
Book

Research in Cryptology: Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers

TL;DR: A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services is proposed in this paper, where the GPS Identification Scheme using Frobenius Expansions and Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256 are discussed.
References
More filters
Book

Advances in cryptology -- EUROCRYPT 2010 : 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30-June 3, 2010 : proceedings

Henri Gilbert
TL;DR: Cryptosystems I and II: Cryptography between Wonderland and Underland as discussed by the authors, a simple BGN-type Cryptosystem from LWE, or Bonsai Trees, or how to delegate a Lattice Basis.
BookDOI

Advances in Cryptology - CRYPTO 2007

TL;DR: In this article, Kannan's Shortest Lattice Vector Algorithm (SLVV) was extended with the use of private CRT-exponents smaller than N 0.073.
Book ChapterDOI

Secure hybrid encryption from weakened key encapsulation

TL;DR: Constrained chosen-ciphertext security is a new security notion for KEMs that has a very constructive appeal and is demonstrated with a new encryption scheme whose security relies on a class of intractability assumptions strictly weaker than the Decision Diffie-Hellman assumption.

Advances in cryptology - CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 : proceedings

A. J. Menezes
TL;DR: This paper discusses Cryptography in the Multi-string Model, Secure Identification and QKD in the Bounded-Quantum-Storage Model, and a Tight High-Order Entropic Quantum Uncertainty Relation with Applications.
Journal Article

Lossy Trapdoor Functions and Their Applications.

TL;DR: In this paper, a general cryptographic primitive called lossy trapdoor functions (lossy TDFs) is proposed, which can be used for constructing several important cryptographic tools, including (injective) trapdoor function, collision-resistant hash functions, oblivious transfer, and chosen ciphertext-secure cryptosystems.
Related Papers (5)