Search Results - "Fehr, Serge"
-
1
A monogamy-of-entanglement game with applications to device-independent quantum cryptography
Published in New journal of physics (02-10-2013)“…We consider a game in which two separate laboratories collaborate to prepare a quantum system and are then asked to guess the outcome of a measurement…”
Get full text
Journal Article -
2
Algebraic manipulation detection codes
Published in Science China. Mathematics (01-07-2013)“…Algebraic manipulation detection codes are a cryptographic primitive that was introduced by Cramer et al. (Eurocrypt 2008). It encompasses several methods that…”
Get full text
Journal Article -
3
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
Published in Advances in Cryptology – EUROCRYPT 2010 (2010)“…Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively…”
Get full text
Book Chapter -
4
Short Non-Malleable Codes from Related-Key Secure Block Ciphers
Published in IACR Transactions on Symmetric Cryptology (01-01-2018)“…A non-malleable code is an unkeyed randomized encoding scheme that offers the strong guarantee that decoding a tampered codeword either results in the original…”
Get full text
Journal Article -
5
On the Conditional Rényi Entropy
Published in IEEE transactions on information theory (01-11-2014)“…The Rényi entropy of general order unifies the well-known Shannon entropy with several other entropy notions, like the min-entropy or collision entropy. In…”
Get full text
Journal Article -
6
Fiat–Shamir Transformation of Multi-Round Interactive Proofs (Extended Version)
Published in Journal of cryptology (01-10-2023)“…The celebrated Fiat–Shamir transformation turns any public-coin interactive proof into a non-interactive one, which inherits the main security properties (in…”
Get full text
Journal Article -
7
Quantum Cryptography
Published in Foundations of physics (01-05-2010)“…Quantum cryptography makes use of the quantum-mechanical behavior of nature for the design and analysis of cryptographic schemes. Optimally (but not always),…”
Get full text
Journal Article -
8
Secure identification and QKD in the bounded-quantum-storage model
Published in Theoretical computer science (04-12-2014)“…We consider the problem of secure identification: user U proves to server S that he knows an agreed (possibly low-entropy) password w, while giving away as…”
Get full text
Journal Article -
9
New Approach to Privacy-Preserving Clinical Decision Support Systems for HIV Treatment
Published in Journal of medical systems (20-10-2022)“…Background HIV treatment prescription is a complex process. Clinical decision support systems (CDSS) are a category of health information technologies that can…”
Get full text
Journal Article -
10
Security and composability of randomness expansion from Bell inequalities
Published in Physical review. A, Atomic, molecular, and optical physics (30-01-2013)Get full text
Journal Article -
11
Short Non-Malleable Codes from Related-Key Secure Block Ciphers
Published in IACR Transactions on Symmetric Cryptology (01-03-2018)“…A non-malleable code is an unkeyed randomized encoding scheme that offers the strong guarantee that decoding a tampered codeword either results in the original…”
Get full text
Journal Article -
12
Adaptive versus Static Multi-oracle Algorithms, and Quantum Security of a Split-key PRF
Published 16-06-2022“…In the first part of the paper, we show a generic compiler that transforms any oracle algorithm that can query multiple oracles adaptively, i.e., can decide on…”
Get full text
Journal Article -
13
The Measure-and-Reprogram Technique 2.0: Multi-Round Fiat-Shamir and More
Published 07-03-2022“…In: Micciancio D., Ristenpart T. (eds) Advances in Cryptology -- CRYPTO 2020. CRYPTO 2020. Lecture Notes in Computer Science, vol 12172. Springer, Cham We…”
Get full text
Journal Article -
14
Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM
Published 28-02-2022“…Commit-and-open Sigma-protocols are a popular class of protocols for constructing non-interactive zero-knowledge arguments and digital-signature schemes via…”
Get full text
Journal Article -
15
Quantum Authentication and Encryption with Key Recycling
Published 18-10-2016“…We propose an information-theoretically secure encryption scheme for classical messages with quantum ciphertexts that offers detection of eavesdropping…”
Get full text
Journal Article -
16
Online-Extractability in the Quantum Random-Oracle Model
Published 04-03-2021“…We show the following generic result. Whenever a quantum query algorithm in the quantum random-oracle model outputs a classical value $t$ that is promised to…”
Get full text
Journal Article -
17
Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model
Published 27-07-2020“…Advances in Cryptology - CRYPTO 2019. Lecture Notes in Computer Science, vol 11693. Springer, Cham The famous Fiat-Shamir transformation turns any public-coin…”
Get full text
Journal Article -
18
On the Composition of Two-Prover Commitments, and Applications to Multi-Round Relativistic Commitments
Published 01-07-2015“…We consider the related notions of two-prover and of relativistic commitment schemes. In recent work, Lunghi et al. proposed a new relativistic commitment…”
Get full text
Journal Article -
19
Multi-Prover Commitments Against Non-Signaling Attacks
Published 12-05-2015“…We reconsider the concept of multi-prover commitments, as introduced in the late eighties in the seminal work by Ben-Or et al. As was recently shown by…”
Get full text
Journal Article -
20
On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work
Published 22-10-2020“…We revisit the so-called compressed oracle technique, introduced by Zhandry for analyzing quantum algorithms in the quantum random oracle model (QROM). To…”
Get full text
Journal Article