An analysis of the algebraic group model

C Zhang, HS Zhou, J Katz - International Conference on the Theory and …, 2022 - Springer
The algebraic group model (AGM), formalized by Fuchsbauer, Kiltz, and Loss, has recently
received significant attention. One of the appealing properties of the AGM is that it is viewed …

Algebraic adversaries in the universal composability framework

M Abdalla, M Barbosa, J Katz, J Loss, J Xu - Advances in Cryptology …, 2021 - Springer
The algebraic-group model (AGM), which lies between the generic group model and the
standard model of computation, provides a means by which to analyze the security of …

Concentration bounds for almost k-wise independence with applications to non-uniform security

N Gravin, S Guo, TC Kwok, P Lu - Proceedings of the 2021 ACM-SIAM …, 2021 - SIAM
We prove a few concentration inequalities for the sum of n binary random variables under
weaker conditions than k-wise independence. Namely, we consider two standard conditions …

Generic-group lower bounds via reductions between geometric-search problems: With and without preprocessing

B Auerbach, C Hoffmann, G Pascual-Perez - Theory of Cryptography …, 2023 - Springer
The generic-group model (GGM) aims to capture algorithms working over groups of prime
order that only rely on the group operation, but do not exploit any additional structure given …

Revisiting the uber assumption in the algebraic group model: Fine-grained bounds in hidden-order groups and improved reductions in bilinear groups

L Rotem - Cryptology ePrint Archive, 2022 - eprint.iacr.org
We prove strong security guarantees for a wide array of computational and decisional
problems, both in hidden-order groups and in bilinear groups, within the algebraic group …

Multi-instance secure public-key encryption

C Brunetta, H Heum, M Stam - IACR International Conference on Public …, 2023 - Springer
Mass surveillance targets many users at the same time with the goal of learning as much as
possible. Intuitively, breaking many users' cryptography simultaneously should be at least as …

Tightness subtleties for multi-user PKE notions

H Heum, M Stam - IMA International Conference on Cryptography and …, 2021 - Springer
Public key encryption schemes are increasingly being studied concretely, with an emphasis
on tight bounds even in a multi-user setting. Here, two types of formalization have emerged …

A New Approach to Generic Lower Bounds: Classical/Quantum MDL, Quantum Factoring, and More

M Hhan - arXiv preprint arXiv:2402.11269, 2024 - arxiv.org
This paper studies the limitations of the generic approaches to solving cryptographic
problems in classical and quantum settings in various models.-In the classical generic group …

Scalable Cryptography

D Hofheinz, E Kiltz - Algorithms for Big Data: DFG Priority Program 1736, 2023 - Springer
In our modern digital society, cryptography is vital to protect the secrecy and integrity of
transmitted and stored information. Settings like digital commerce, electronic banking, or …

A Hybrid Elliptic Curve and Data Encryption Standard Algorithm for Secure Data Communication

SN John, E Noma-Osaghae… - … of Science and …, 2024 - ajse.academyjsekad.edu.ng
Abstract n the rapidly evolving landscape of digital communication, ensuring data security
remains a paramount concern. This research proposes a hybrid encryption technique that …