Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Tommaso Gagliardoni"'
Publikováno v:
Quantum, Vol 5, p 603 (2021)
Cryptography with quantum states exhibits a number of surprising and counterintuitive features. In a 2002 work, Barnum et al. argue that these features imply that digital signatures for quantum states are impossible (Barnum et al., FOCS 2002). In thi
Externí odkaz:
https://doaj.org/article/1302f393c6bd4086a8667ef59f972352
Publikováno v:
Post-Quantum Cryptography ISBN: 9783030812928
PQCrypto
PQCrypto
In this work we study the quantum security of public key encryption schemes (PKE). Boneh and Zhandry (CRYPTO’13) initiated this research area for PKE and symmetric key encryption (SKE), albeit restricted to a classical indistinguishability phase. G
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::312a1460f5f9509d0c1086afa9c8a8a1
https://doi.org/10.1007/978-3-030-81293-5_24
https://doi.org/10.1007/978-3-030-81293-5_24
Publikováno v:
Quantum, 5, 603.1-603.38
Quantum, Vol 5, p 603 (2021)
Quantum, Vol 5, p 603 (2021)
Cryptography with quantum states exhibits a number of surprising and counterintuitive features. In a 2002 work, Barnum et al. argue that these features imply that digital signatures for quantum states are impossible (Barnum et al., FOCS 2002). In thi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::59bff82e4624b5c978a0f48f93a994af
Autor:
Felix Günther, Victoria Fehr, Tommaso Gagliardoni, Giorgia Azzurra Marson, Jean Paul Degabriele, Arno Mittelbach, Kenneth G. Paterson, Marc Fischlin
Publikováno v:
International Journal of Information Security. 15:637-657
The Protocol for Lightweight Authentication of Identity (PLAID) aims at secure and private authentication between a smart card and a terminal. Originally developed by a unit of the Australian Department of Human Services for physical and logical acce
Publikováno v:
Advances in Cryptology – EUROCRYPT 2018 ISBN: 9783319783710
EUROCRYPT (3)
EUROCRYPT (3)
We study the problem of encrypting and authenticating quantum data in the presence of adversaries making adaptive chosen plaintext and chosen ciphertext queries. Classically, security games use string copying and comparison to detect adversarial chea
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::447926b08e9414b519418d8fb99880b3
https://doi.org/10.1007/978-3-319-78372-7_16
https://doi.org/10.1007/978-3-319-78372-7_16
Publikováno v:
Advances in Cryptology – EUROCRYPT 2018 ISBN: 9783319783802
EUROCRYPT (1)
EUROCRYPT (1)
The random-oracle model by Bellare and Rogaway (CCS’93) is an indispensable tool for the security analysis of practical cryptographic protocols. However, the traditional random-oracle model fails to guarantee security when a protocol is composed wi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c48ea1a0a7353d9150bb782bfb7f8d30
https://doi.org/10.1007/978-3-319-78381-9_11
https://doi.org/10.1007/978-3-319-78381-9_11
Publikováno v:
Post-Quantum Cryptography ISBN: 9783319598789
PQCrypto
PQCrypto
We study the security of Oblivious Random Access Machines (ORAM) in the quantum world. First we introduce a new formal treatment of ORAMs, which is at the same time elegant and simpler than the known formalization by Goldreich and Ostrovsky. Then we
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0095911cdaad3357602e330d04ae7d11
https://doi.org/10.1007/978-3-319-59879-6_23
https://doi.org/10.1007/978-3-319-59879-6_23
Publikováno v:
Public-Key Cryptography – PKC 2014 ISBN: 9783642546303
Public Key Cryptography
17th International Conference on Practice and Theory in Public-Key Cryptography. PKC 2014, 556-573
STARTPAGE=556;ENDPAGE=573;TITLE=17th International Conference on Practice and Theory in Public-Key Cryptography. PKC 2014
Public Key Cryptography
17th International Conference on Practice and Theory in Public-Key Cryptography. PKC 2014, 556-573
STARTPAGE=556;ENDPAGE=573;TITLE=17th International Conference on Practice and Theory in Public-Key Cryptography. PKC 2014
Group homomorphic encryption represents one of the most important building blocks in modern cryptography. It forms the basis of widely-used, more sophisticated primitives, such as CCA2-secure encryption or secure multiparty computation. Unfortunately
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::02d98b147e42aec24d8ea1e3f17cbf19
https://doi.org/10.1007/978-3-642-54631-0_32
https://doi.org/10.1007/978-3-642-54631-0_32
Autor:
Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson
Publikováno v:
Security Standardisation Research ISBN: 9783319140537
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c4be4388fd9f955ecc620e817d110f5b
https://doi.org/10.1007/978-3-319-14054-4_1
https://doi.org/10.1007/978-3-319-14054-4_1
Publikováno v:
Advances in Cryptology-ASIACRYPT 2013 ISBN: 9783642420443
ASIACRYPT (2)
ASIACRYPT (2)
The Fiat-Shamir transformation is a famous technique to turn identification schemes into signature schemes. The derived scheme is provably secure in the random-oracle model against classical adversaries. Still, the technique has also been suggested t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f9238d60929181d3ad4038768ae214ff
https://doi.org/10.1007/978-3-642-42045-0_4
https://doi.org/10.1007/978-3-642-42045-0_4