A new general framework for secure public key encryption with keyword search

R Chen, Y Mu, G Yang, F Guo, X Wang - … , QLD, Australia, June 29--July 1 …, 2015 - Springer
Abstract Public Key Encryption with Keyword Search (PEKS), introduced by Boneh et al. in
Eurocrypt'04, allows users to search encrypted documents on an untrusted server without …

Public‐key encryption indistinguishable under plaintext‐checkable attacks

M Abdalla, F Benhamouda… - IET Information …, 2016 - Wiley Online Library
Indistinguishability under chosen‐ciphertext attack (IND‐CCA) is now considered the de
facto security notion for public‐key encryption. However, this sometimes offers a stronger …

Disjunctions for hash proof systems: New constructions and applications

M Abdalla, F Benhamouda, D Pointcheval - Advances in Cryptology …, 2015 - Springer
Abstract Hash Proof Systems were first introduced by Cramer and Shoup (Eurocrypt'02) as a
tool to construct efficient chosen-ciphertext-secure encryption schemes. Since then, they …

A flexible and scalable malicious secure aggregation protocol for federated learning

J Tang, H Xu, M Wang, T Tang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Secure aggregation becomes a major solution to providing privacy for federated learning.
Secure aggregation for mobile devices typically relies on Shamir secret sharing (SSS) to …

Verifier-based password-authenticated key exchange: New models and constructions

F Benhamouda, D Pointcheval - Cryptology ePrint Archive, 2013 - eprint.iacr.org
While password-authenticated key exchange (or PAKE) protocols have been deeply
studied, a server corruption remains the main threat, with many concrete cases nowadays …

Strongly leakage-resilient authenticated key exchange

R Chen, Y Mu, G Yang, W Susilo, F Guo - Cryptographers' Track at the …, 2016 - Springer
Abstract Authenticated Key Exchange (AKE) protocols have been widely deployed in many
real-world applications for securing communication channels. In this paper, we make the …

Password-based authenticated key exchange: An overview

M Abdalla - … Security: 8th International Conference, ProvSec 2014 …, 2014 - Springer
Password-based authenticated key exchange (PAKE) protocols are a particular case of
authenticated key exchange protocols in which the secret key or password used for …

Efficient and universally composable protocols for oblivious transfer from the CDH assumption

E Hauck, J Loss - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Oblivious Transfer (OT) is a simple, yet fundamental primitive which suffices to achieve
almost every cryptographic application. In a recent work (Latincrypt15), Chou and Orlandi …

Strong authenticated key exchange with auxiliary inputs

R Chen, Y Mu, G Yang, W Susilo, F Guo - Designs, Codes and …, 2017 - Springer
Leakage attacks, including various kinds of side-channel attacks, allow an attacker to learn
partial information about the internal secrets such as the secret key and the randomness of a …

Efficient and round-optimal oblivious transfer and commitment with adaptive security

R Canetti, P Sarkar, X Wang - International Conference on the Theory and …, 2020 - Springer
We construct the most efficient two-round adaptively secure bit-OT in the Common Random
String (CRS CRS) model. The scheme is UC secure under the Decisional Diffie-Hellman …