2011
Authors
Barbosa, M; Farshim, P;
Publication
IACR Cryptology ePrint Archive
Abstract
2009
Authors
Bangerter, E; Barbosa, M; Bernstein, D; Damgård, I; Page, D; Pagter, JI; Sadeghi, AR; Sovio, S;
Publication
ISSE 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009
Abstract
2012
Authors
Barbosa, M; Farshim, P;
Publication
IACR Cryptology ePrint Archive
Abstract
2012
Authors
Arriaga, A; Barbosa, M; Farshim, P;
Publication
IACR Cryptology ePrint Archive
Abstract
2007
Authors
Barbosal, M; Farshim, P;
Publication
CRYPTOGRAPHY AND CODING, PROCEEDINGS
Abstract
We extend the generic framework of reproducibility for reuse of randomness in multi-recipient encryption schemes as proposed by Bellare et al. (PKC 2003). A new notion of weak reproducibility captures not only encryption schemes which are (fully) reproducible under the criteria given in the previous work, but also a class of efficient schemes which can only be used in the single message setting. In particular, we are able to capture the single message schemes suggested by Kurosawa (PKC 2002), which are more efficient than the direct adaptation of the multiple message schemes studied by Bellare et al. Our study of randomness reuse in key encapsulation mechanisms provides an additional argument for the relevance of these results: by taking advantage of our weak reproducibility notion, we are able to generalise and improve multi-recipient KEM constructions found in literature. We also propose an efficient multi-recipient KEM provably secure in the standard model and conclude the paper by proposing a notion of direct reproducibility which enables tighter security reductions.
2005
Authors
Barbosa, M; Farshim, P;
Publication
CRYPTOGRAPHY AND CODING, PROCEEDINGS
Abstract
We introduce the concept of identity based key encapsulation to multiple parties (mID-KEM), and define a security model for it. This concept is the identity based analogue of public key KEM to multiple parties. We also analyse possible mID-KEM constructions, and propose an efficient scheme based on bilinear pairings. We prove our scheme secure in the random oracle model under the Gap Bilinear Diffie-Hellman assumption.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.