Key homomorphic PRFs and their applications

D Boneh, K Lewi, H Montgomery… - Annual Cryptology …, 2013 - Springer
A pseudorandom function F:\mathcalK*\mathcalX→\mathcalY is said to be key homomorphic
if given F (k 1, x) and F (k 2, x) there is an efficient algorithm to compute F (k 1⊕ k 2, x) …

Trapdoor hash functions and their applications

N Döttling, S Garg, Y Ishai, G Malavolta, T Mour… - Annual International …, 2019 - Springer
We introduce a new primitive, called trapdoor hash functions (TDH), which are hash
functions H:{0, 1\}^ n → {0, 1\}^ λ with additional trapdoor function-like properties …

New and improved key-homomorphic pseudorandom functions

A Banerjee, C Peikert - Advances in Cryptology–CRYPTO 2014: 34th …, 2014 - Springer
A key-homomorphic pseudorandom function (PRF) family {F s: D→ R} allows one to
efficiently compute the value F s+ t (x) given F s (x) and F t (x). Such functions have many …

Subversion-resilient signature schemes

G Ateniese, B Magri, D Venturi - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
We provide a formal treatment of security of digital signatures against subversion attacks
(SAs). Our model of subversion generalizes previous work in several directions, and is …

Efficient non-malleable codes and key derivation for poly-size tampering circuits

S Faust, P Mukherjee, D Venturi… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Non-malleable codes, defined by Dziembowski, Pietrzak, and Wichs (ICS'10), provide
roughly the following guarantee: if a codeword c encoding some message x is tampered to …

On the security of the “free-XOR” technique

SG Choi, J Katz, R Kumaresan, HS Zhou - Theory of Cryptography …, 2012 - Springer
Yao's garbled-circuit approach enables constant-round secure two-party computation of any
function. In Yao's original construction, each gate in the circuit requires the parties to perform …

Cryptography secure against related-key attacks and tampering

M Bellare, D Cash, R Miller - … 2011: 17th International Conference on the …, 2011 - Springer
We show how to leverage the RKA (Related-Key Attack) security of blockciphers to provide
RKA security for a suite of high-level primitives. This motivates a more general theoretical …

Correlated-input secure hash functions

V Goyal, A O'Neill, V Rao - Theory of Cryptography: 8th Theory of …, 2011 - Springer
We undertake a general study of hash functions secure under correlated inputs, meaning
that security should be maintained when the adversary sees hash values of many related …

Tamper detection and continuous non-malleable codes

Z Jafargholi, D Wichs - Theory of Cryptography Conference, 2015 - Springer
WeN consider a public and keyless code (Enc, Dec) which is used to encode a message m
and derive a codeword c= Enc (m). The codeword can be adversarially tampered via a …

Public key encryption against related key attacks

H Wee - International Workshop on Public Key Cryptography, 2012 - Springer
In this work, we present efficient public-key encryption schemes resilient against linear
related key attacks (RKA) under standard assumptions and in the standard model …