[HTML][HTML] Post-quantum cryptosystems for Internet-of-Things: A survey on lattice-based algorithms

R Asif - IoT, 2021 - mdpi.com
The latest quantum computers have the ability to solve incredibly complex classical
cryptography equations particularly to decode the secret encrypted keys and making the …

An algebraic framework for Diffie–Hellman assumptions

A Escala, G Herold, E Kiltz, C Ràfols, J Villar - Journal of cryptology, 2017 - Springer
We put forward a new algebraic framework to generalize and analyze Diffie–Hellman like
decisional assumptions which allows us to argue about security and applications by …

Fully,(almost) tightly secure IBE and dual system groups

J Chen, H Wee - Annual Cryptology Conference, 2013 - Springer
We present the first fully secure Identity-Based Encryption scheme (IBE) from the standard
assumptions where the security loss depends only on the security parameter and is …

Cybersecurity challenges associated with the internet of things in a post-quantum world

OS Althobaiti, M Dohler - Ieee Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is an emerging networking paradigm connecting billions of
devices securely to the Internet. Another emerging paradigm is quantum computing which …

Tightly CCA-secure encryption without pairings

R Gay, D Hofheinz, E Kiltz, H Wee - … on the Theory and Applications of …, 2016 - Springer
We present the first CCA-secure public-key encryption scheme based on DDH where the
security loss is independent of the number of challenge ciphertexts and the number of …

Linearly homomorphic structure-preserving signatures and their applications

B Libert, T Peters, M Joye, M Yung - Designs, Codes and Cryptography, 2015 - Springer
Abstract Structure-preserving signatures (SPS) are signature schemes where messages,
signatures and public keys all consist of elements of a group over which a bilinear map is …

Tightly-secure authenticated key exchange

C Bader, D Hofheinz, T Jager, E Kiltz, Y Li - Theory of Cryptography: 12th …, 2015 - Springer
We construct the first Authenticated Key Exchange (AKE) protocol whose security does not
degrade with an increasing number of users or sessions. We describe a three-message …

Constant-size structure-preserving signatures: Generic constructions and simple assumptions

M Abe, M Chase, B David, M Kohlweiss… - Journal of …, 2016 - Springer
This paper presents efficient structure-preserving signature schemes based on simple
assumptions such as decisional linear. We first give two general frameworks for constructing …

On the impossibility of tight cryptographic reductions

C Bader, T Jager, Y Li, S Schäge - … on the Theory and Applications of …, 2016 - Springer
The existence of tight reductions in cryptographic security proofs is an important question,
motivated by the theoretical search for cryptosystems whose security guarantees are truly …

Practical and tightly-secure digital signatures and authenticated key exchange

K Gjøsteen, T Jager - Advances in Cryptology–CRYPTO 2018: 38th …, 2018 - Springer
Tight security is increasingly gaining importance in real-world cryptography, as it allows to
choose cryptographic parameters in a way that is supported by a security proof, without the …