Authenticated encryption schemes: A systematic review

MA Jimale, MR Z'aba, MLBM Kiah, MYI Idris… - IEEE …, 2022 - ieeexplore.ieee.org
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …

Deco: Liberating web data using decentralized oracles for tls

F Zhang, D Maram, H Malvai, S Goldfeder… - Proceedings of the 2020 …, 2020 - dl.acm.org
Thanks to the widespread deployment of TLS, users can access private data over channels
with end-to-end confidentiality and integrity. What they cannot do, however, is prove to third …

A survey on cryptographic techniques for protecting big data security: present and forthcoming

S Lu, J Zheng, Z Cao, Y Wang, C Gu - Science China Information …, 2022 - Springer
Big data drive multidimensional convergence and profound innovations among industries
and provide novel ways of exploring the world. As they significantly create economic and …

Efficient schemes for committing authenticated encryption

M Bellare, VT Hoang - Annual International Conference on the Theory and …, 2022 - Springer
This paper provides efficient authenticated-encryption (AE) schemes in which a ciphertext is
a commitment to the key. These are extended, at minimal additional cost, to schemes where …

Fast message franking: From invisible salamanders to encryptment

Y Dodis, P Grubbs, T Ristenpart, J Woodage - Advances in Cryptology …, 2018 - Springer
Message franking enables cryptographically verifiable reporting of abusive messages in end-
to-end encrypted messaging. Grubbs, Lu, and Ristenpart recently formalized the needed …

{Zero-Knowledge} Middleboxes

P Grubbs, A Arun, Y Zhang, J Bonneau… - 31st USENIX Security …, 2022 - usenix.org
This paper initiates research on zero-knowledge middleboxes (ZKMBs). A ZKMB is a
network middlebox that enforces network usage policies on encrypted traffic. Clients send …

Anonymous, robust post-quantum public key encryption

P Grubbs, V Maram, KG Paterson - … on the Theory and Applications of …, 2022 - Springer
A core goal of the NIST PQC competition is to produce PKE schemes which, even if attacked
with a large-scale quantum computer, maintain the security guarantees needed by …

On committing authenticated-encryption

J Chan, P Rogaway - European Symposium on Research in Computer …, 2022 - Springer
We provide a strong definition for committing authenticated-encryption (cAE), as well as a
framework that encompasses earlier and weaker definitions. The framework attends not only …

Key rotation for authenticated encryption

A Everspaugh, K Paterson, T Ristenpart… - Advances in Cryptology …, 2017 - Springer
A common requirement in practice is to periodically rotate the keys used to encrypt stored
data. Systems used by Amazon and Google do so using a hybrid encryption technique …

Identifying harmful media in {End-to-End} encrypted communication: Efficient private membership computation

A Kulshrestha, J Mayer - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
End-to-end encryption (E2EE) poses a challenge for automated detection of harmful media,
such as child sexual abuse material and extremist content. The predominant approach at …