CCA-Secure Deterministic Identity-Based Encryption Scheme [PDF]
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involving any randomness, was introduced by Bellare, Boldyreva, and O'Neill (CRYPTO 2007) as a realistic alternative to some inherent drawbacks in randomized ...
Meijuan Huang +5 more
doaj +7 more sources
Deterministic Authenticated Encryption Scheme for Memory Constrained Devices [PDF]
A technique of authenticated encryption for memory constrained devices called sp-AELM was proposed by Agrawal et al. at ACISP 2015. The sp-ALEM construction utilizes a sponge-based primitive to support online encryption and decryption functionalities ...
Megha Agrawal +2 more
doaj +4 more sources
LM-DAE: Low-Memory Deterministic Authenticated Encryption for 128-bit Security
This paper proposes a new lightweight deterministic authenticated encryption (DAE) scheme providing 128-bit security. Lightweight DAE schemes are practically important because resource-restricted devices sometimes cannot afford to manage a nonce properly.
Yusuke Naito +2 more
doaj +5 more sources
Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data
Statistical analysis of ciphertexts has been recently used to carry out devastating inference attacks on deterministic encryption (Naveed, Kamara, and Wright, CCS 2015), order-preserving/revealing encryption (Grubbs et al., S&P 2017), and searchable ...
Marie-Sarah Lacharité +1 more
doaj +6 more sources
SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things
Lightweight cryptography was developed in response to the increasing need to secure devices for the Internet of Things. After significant research effort, many new block ciphers have been designed targeting lightweight settings, optimizing efficiency ...
Subhadeep Banik +3 more
doaj +6 more sources
Algebraic Cryptanalysis of Deterministic Symmetric Encryption [PDF]
Deterministic symmetric encryption is widely used in many cryptographic applications. The security of deterministic block and stream ciphers is evaluated using cryptanalysis. Cryptanalysis is divided into two main categories: statistical cryptanalysis and algebraic cryptanalysis.
Petr Sušil
openalex +3 more sources
Practical CCA-Secure Functional Encryptions for Deterministic Functions [PDF]
Functional encryption (FE) can implement fine-grained control to encrypted plaintext via permitting users to compute only some specified functions on the encrypted plaintext using private keys with respect to those functions. Recently, many FEs were put forward; nonetheless, most of them cannot resist chosen-ciphertext attacks (CCAs), especially for ...
Huige Wang +3 more
openalex +2 more sources
Encryption using Deterministic Chaos.
The concepts of randomness, unpredictability, complexity and entropy form the basis of modern cryptography and a cryptosystem can be interpreted as the design of a key-dependent bijective transformation that is unpredictable to an observer for a given computational resource.
Jonathan Blackledge
openalex +4 more sources
Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes [PDF]
We study how to make any deterministic encryption scheme probabilistic and secure against adaptively chosen ciphertext attacks. A new transpositional padding encryption scheme is proposed, with which we construct a universal scheme, namely, a ...
Linming Gong +4 more
doaj +2 more sources
Towards Tightly Secure Deterministic Public Key Encryption [PDF]
This paper presents three curious findings about deterministic public-key encryption (D-PKE) that further our understanding of its security, in particular because of the contrast with standard, randomized public-key encryption (R-PKE): It would appear to be a triviality, for any primitive, that security in the standard model implies security in ...
Daode Zhang +5 more
+4 more sources

