Resisting randomness subversion: Fast deterministic and hedged public-key encryption in the standard model

M Bellare, VT Hoang - Advances in Cryptology-EUROCRYPT 2015: 34th …, 2015 - Springer
This paper provides the first efficient, standard-model, fully-secure schemes for some related
and challenging forms of public-key encryption (PKE), namely deterministic and hedged …

SoK: Privacy-preserving collaborative tree-based model learning

S Chatel, A Pyrgelis, JR Troncoso-Pastoriza… - arXiv preprint arXiv …, 2021 - arxiv.org
Tree-based models are among the most efficient machine learning techniques for data
mining nowadays due to their accuracy, interpretability, and simplicity. The recent …

Confidentiality attacks against encrypted control systems

AM Naseri, W Lucia, A Youssef - Cyber-Physical Systems, 2023 - Taylor & Francis
Encrypted control systems were introduced to enhance the security of cyber-physical
systems, which outsource control action computations to a third-party platform. To protect the …

Selective-opening security in the presence of randomness failures

VT Hoang, J Katz, A O'Neill, M Zaheri - … on the Theory and Application of …, 2016 - Springer
We initiate the study of public-key encryption (PKE) secure against selective-opening attacks
(SOA) in the presence of randomness failures, ie, when the sender may (inadvertently) use …

A generic construction of CCA-secure deterministic encryption

M Huang, B Yang, Y Zhao, X Wang, Y Zhou… - Information Processing …, 2020 - Elsevier
Deterministic public-key encryption (D-PKE), introduced by Bellare, Boldyreva, and O'Neill
(CRYPTO'07), encrypts every plaintext into a unique ciphertext without using any …

Hedged nonce-based public-key encryption: adaptive security under randomness failures

Z Huang, J Lai, W Chen, MH Au, Z Peng, J Li - Public-Key Cryptography …, 2018 - Springer
Nowadays it is well known that randomness may fail due to bugs or deliberate randomness
subversion. As a result, the security of traditional public-key encryption (PKE) cannot be …

[HTML][HTML] Secure-channel free searchable encryption with multiple keywords: A generic construction, an instantiation, and its implementation

K Emura, K Ito, T Ohigashi - Journal of Computer and System Sciences, 2020 - Elsevier
In public key encryption with keyword search (PEKS), a secure channel is required in order
to send trapdoors to the server, whereas in secure-channel free PEKS (SCF-PEKS), no such …

Private functional encryption: indistinguishability-based definitions and constructions from obfuscation

A Arriaga, M Barbosa, P Farshim - … on Cryptology in India, Kolkata, India …, 2016 - Springer
Private functional encryption guarantees that not only the information in ciphertexts is hidden
but also the circuits in decryption tokens are protected. A notable use case of this notion is …

Varying Encryption Scheme: An Innovative Approach to Legacy Data Security

A Sunoj, BV Sherif - 2023 Annual International Conference on …, 2023 - ieeexplore.ieee.org
This paper explores the advantages and limitations of probabilistic and deterministic
encryption schemes for securing sensitive data. While probabilistic encryption ensures high …

Using transposition padding to get CCA2 security from any deterministic encryption schemes

L Gong, M Wang, X Zuo, S Li, D Wang - IEEE Access, 2019 - ieeexplore.ieee.org
We study how to make any deterministic encryption scheme probabilistic and secure against
adaptively chosen ciphertext attacks. A new transpositional padding encryption scheme is …