Cryptographic group actions and applications

N Alamati, L De Feo, H Montgomery… - Advances in Cryptology …, 2020 - Springer
Isogeny-based assumptions have emerged as a viable option for quantum-secure
cryptography. Recent works have shown how to build efficient (public-key) primitives from …

Fully homomorphic encryption from ring-LWE and security for key dependent messages

Z Brakerski, V Vaikuntanathan - Annual cryptology conference, 2011 - Springer
We present a somewhat homomorphic encryption scheme that is both very simple to
describe and analyze, and whose security (quantumly) reduces to the worst-case hardness …

Foundations of garbled circuits

M Bellare, VT Hoang, P Rogaway - … of the 2012 ACM conference on …, 2012 - dl.acm.org
Garbled circuits, a classical idea rooted in the work of Yao, have long been understood as a
cryptographic technique, not a cryptographic goal. Here we cull out a primitive …

Fiat-Shamir: from practice to theory

R Canetti, Y Chen, J Holmgren, A Lombardi… - Proceedings of the 51st …, 2019 - dl.acm.org
We give new instantiations of the Fiat-Shamir transform using explicit, efficiently computable
hash functions. We improve over prior work by reducing the security of these protocols to …

Public-key cryptosystems resilient to key leakage

M Naor, G Segev - Advances in Cryptology-CRYPTO 2009: 29th Annual …, 2009 - Springer
Most of the work in the analysis of cryptographic schemes is concentrated in abstract
adversarial models that do not capture side-channel attacks. Such attacks exploit various …

Anonymous IBE, leakage resilience and circular security from new assumptions

Z Brakerski, A Lombardi, G Segev… - … Conference on the …, 2018 - Springer
In anonymous identity-based encryption (IBE), ciphertexts not only hide their corresponding
messages, but also their target identity. We construct an anonymous IBE scheme based on …

Computing blindfolded: New developments in fully homomorphic encryption

V Vaikuntanathan - 2011 IEEE 52nd annual symposium on …, 2011 - ieeexplore.ieee.org
A fully homomorphic encryption scheme enables computation of arbitrary functions on
encrypted data. Fully homomorphic encryption has long been regarded as cryptography's …

Fiat-Shamir and correlation intractability from strong KDM-secure encryption

R Canetti, Y Chen, L Reyzin, RD Rothblum - … , Tel Aviv, Israel, April 29-May …, 2018 - Springer
A hash function family is called correlation intractable if for all sparse relations, it is hard to
find, given a random function from the family, an input-output pair that satisfies the relation …

Succinct randomized encodings and their applications

N Bitansky, S Garg, H Lin, R Pass… - Proceedings of the forty …, 2015 - dl.acm.org
A randomized encoding allows to express a" complex" computation, given by a function f
and input x, by a" simple to compute" randomized representation f (x) whose distribution …

How to garble arithmetic circuits

B Applebaum, Y Ishai, E Kushilevitz - SIAM Journal on Computing, 2014 - SIAM
Yao's garbled circuit construction transforms a boolean circuit C:{0,1\}^n→{0,1\}^m into a
“garbled circuit” ̂C along with n pairs of k-bit keys, one for each input bit, such that ̂C …