Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Foundations and Applications of Functional Cryptography

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Publications

Algebraic Distinguishers: From Discrete Logarithms to Decisional Uber Assumptions (opens in new window)

Author(s): Lior Rotem, Gil Segev
Published in: Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part III, Issue 12552, 2020, Page(s) 366-389, ISBN 978-3-030-64380-5
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-64381-2_13

Generically Speeding-Up Repeated Squaring Is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions (opens in new window)

Author(s): Lior Rotem, Gil Segev
Published in: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III, Issue 12172, 2020, Page(s) 481-509, ISBN 978-3-030-56876-4
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-56877-1_17

Accumulators in (and Beyond) Generic Groups: Non-trivial Batch Verification Requires Interaction (opens in new window)

Author(s): Gili Schul-Ganz, Gil Segev
Published in: Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part II, Issue 12551, 2020, Page(s) 77-107, ISBN 978-3-030-64377-5
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-64378-2_4

Injective Trapdoor Functions via Derandomization: How Strong is Rudich’s Black-Box Barrier? (opens in new window)

Author(s): Lior Rotem, Gil Segev
Published in: Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part I, Issue 11239, 2018, Page(s) 421-447, ISBN 978-3-030-03806-9
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-03807-6_16

The Security of Lazy Users in Out-of-Band Authentication (opens in new window)

Author(s): Moni Naor, Lior Rotem, Gil Segev
Published in: Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II, Issue 11240, 2018, Page(s) 575-599, ISBN 978-3-030-03809-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-03810-6_21

Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound (opens in new window)

Author(s): Gil Segev, Ido Shahaf
Published in: Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II, Issue 11240, 2018, Page(s) 177-191, ISBN 978-3-030-03809-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-03810-6_7

Generic-Group Delay Functions Require Hidden-Order Groups (opens in new window)

Author(s): Lior Rotem, Gil Segev, Ido Shahaf
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part III, Issue 12107, 2020, Page(s) 155-180, ISBN 978-3-030-45726-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-45727-3_6

Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for Σ-Protocols (opens in new window)

Author(s): Lior Rotem, Gil Segev
Published in: Advances in Cryptology – CRYPTO 2021, 2021, Page(s) 222-250
Publisher: Springer
DOI: 10.1007/978-3-030-84242-0_9

Crypto-Oriented Neural Architecture Design (opens in new window)

Author(s): Avital Shafran, Gil Segev, Shmuel Peleg, Yedid Hoshen
Published in: ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2021, Page(s) 2680-2684, ISBN 978-1-7281-7605-5
Publisher: IEEE
DOI: 10.1109/icassp39728.2021.9413592

A Fully-Constructive Discrete-Logarithm Preprocessing Algorithm with an Optimal Time-Space Tradeoff (opens in new window)

Author(s): Lior Rotem, Gil Segev
Published in: 3rd Conference on Information-Theoretic Cryptography (ITC 2022), 2022, Page(s) 12:1--12:16, ISBN 978-3-95977-238-9
Publisher: "Schloss Dagstuhl -- Leibniz-Zentrum f{\""u}r Informatik"
DOI: 10.4230/lipics.itc.2022.12

Hardness vs. (Very Little) Structure in Cryptography: A Multi-Prover Interactive Proofs Perspective (opens in new window)

Author(s): Gil Segev, Ido Shahaf
Published in: 1st Conference on Information-Theoretic Cryptography (ITC 2020), 2020, Page(s) 10:1--10:23, ISBN 978-3-95977-151-1
Publisher: "Schloss Dagstuhl--Leibniz-Zentrum f{\""u}r Informatik"
DOI: 10.4230/lipics.itc.2020.10

Generic-Group Identity-Based Encryption: A Tight Impossibility Result (opens in new window)

Author(s): Gili Schul-Ganz, Gil Segev
Published in: 2nd Conference on Information-Theoretic Cryptography (ITC 2021), 2021, Page(s) 26:1--26:23, ISBN 978-3-95977-197-9
Publisher: "Schloss Dagstuhl -- Leibniz-Zentrum f{\""u}r Informatik"
DOI: 10.4230/lipics.itc.2021.26

An Information-Theoretic Proof of the Streaming Switching Lemma for Symmetric Encryption (opens in new window)

Author(s): Ido Shahaf, Or Ordentlich, Gil Segev
Published in: 2020 IEEE International Symposium on Information Theory (ISIT), 2020, Page(s) 858-863, ISBN 978-1-7281-6432-8
Publisher: IEEE
DOI: 10.1109/isit44484.2020.9174331

Out-of-Band Authentication in Group Messaging: Computational, Statistical, Optimal (opens in new window)

Author(s): Lior Rotem, Gil Segev
Published in: Advances in Cryptology – CRYPTO 2018, 2018, Page(s) 63-89
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-96884-1_3

Tight Tradeoffs in Searchable Symmetric Encryption (opens in new window)

Author(s): Gilad Asharov, Gil Segev, Ido Shahaf
Published in: Advances in Cryptology -- CRYPTO 2018, 2018, Page(s) 407-436
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-96884-1_14

Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions (opens in new window)

Author(s): Zvika Brakerski, Alex Lombardi, Gil Segev, Vinod Vaikuntanathan
Published in: Advances in Cryptology -- EUROCRYPT 2018, 2018, Page(s) 535-564
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-78381-9_20

Securing Abe's Mix-Net Against Malicious Verifiers via Witness Indistinguishability (opens in new window)

Author(s): Elette Boyle, Saleet Klein, Alon Rosen, Gil Segev
Published in: Security and Cryptography for Networks - 11th International Conference, SCN 2018, 2018, Page(s) 274-291
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-98113-0_15

From Minicrypt to Obfustopia via Private-Key Functional Encryption (opens in new window)

Author(s): Ilan Komargodski, Gil Segev
Published in: Advances in Cryptology - EUROCRYPT 2017, 2017, Page(s) 122-151
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-56620-7_5

Can PPAD Hardness be Based on Standard Cryptographic Assumptions? (opens in new window)

Author(s): Alon Rosen, Gil Segev, Ido Shahaf
Published in: Theory of Cryptography Conference (TCC 2017), 2017, Page(s) 747-776
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-70503-3_25

Strengthening the Security of Encrypted Databases: Non-Transitive JOINs (opens in new window)

Author(s): Ilya Mironov, Gil Segev, Ido Shahaf
Published in: Theory of Cryptography Conference (TCC 2017), 2017, Page(s) 631-661
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-70503-3_21

Non-Malleable Vector Commitments via Local Equivocability (opens in new window)

Author(s): Lior Rotem, Gil Segev
Published in: Theory of Cryptography Conference (TCC 2021), 2021, Page(s) 415--446
Publisher: Springer
DOI: 10.1007/978-3-030-90456-2_14

Out-Of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery (opens in new window)

Author(s): Moni Naor, Lior Rotem, Gil Segev
Published in: 1st Conference on Information-Theoretic Cryptography (ITC 2020), 2020, Page(s) 9:1--9:25, ISBN 978-3-95977-151-1
Publisher: "Schloss Dagstuhl--Leibniz-Zentrum f{\""u}r Informatik"
DOI: 10.4230/lipics.itc.2020.9

Tight Tradeoffs in Searchable Symmetric Encryption (opens in new window)

Author(s): Gilad Asharov, Gil Segev, Ido Shahaf
Published in: Journal of Cryptology, Issue 34/2, 2021, ISSN 0933-2790
Publisher: Springer Verlag
DOI: 10.1007/s00145-020-09370-z

Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions (opens in new window)

Author(s): Zvika Brakerski, Ilan Komargodski, Gil Segev
Published in: Journal of Cryptology, Issue 31/2, 2018, Page(s) 434-520, ISSN 0933-2790
Publisher: Springer Verlag
DOI: 10.1007/s00145-017-9261-0

On Constructing One-Way Permutations from Indistinguishability Obfuscation (opens in new window)

Author(s): Gilad Asharov, Gil Segev
Published in: Journal of Cryptology, Issue 31/3, 2018, Page(s) 698-736, ISSN 0933-2790
Publisher: Springer Verlag
DOI: 10.1007/s00145-017-9268-6

Function-Private Functional Encryption in the Private-Key Setting (opens in new window)

Author(s): Zvika Brakerski, Gil Segev
Published in: Journal of Cryptology, Issue 31/1, 2018, Page(s) 202-225, ISSN 0933-2790
Publisher: Springer Verlag
DOI: 10.1007/s00145-017-9255-y

Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions (opens in new window)

Author(s): Ananth Raghunathan, Gil Segev, Salil Vadhan
Published in: Journal of Cryptology, Issue 31/4, 2018, Page(s) 1012-1063, ISSN 0933-2790
Publisher: Springer Verlag
DOI: 10.1007/s00145-018-9287-y

Privacy-Preserving Interdomain Routing at Internet Scale (opens in new window)

Author(s): Gilad Asharov, Daniel Demmler, Michael Schapira, Thomas Schneider, Gil Segev, Scott Shenker, Michael Zohner
Published in: Proceedings on Privacy Enhancing Technologies, Issue 2017/3, 2017, Page(s) 147-167, ISSN 2299-0984
Publisher: Proceedings on Privacy Enhancing Technologies
DOI: 10.1515/popets-2017-0033

From Minicrypt to Obfustopia via Private-Key Functional Encryption (opens in new window)

Author(s): Ilan Komargodski, Gil Segev
Published in: Journal of Cryptology, 2020, ISSN 0933-2790
Publisher: Springer Verlag
DOI: 10.1007/s00145-019-09327-x

Can PPAD Hardness be Based on Standard Cryptographic Assumptions? (opens in new window)

Author(s): Alon Rosen, Gil Segev, Ido Shahaf
Published in: Journal of Cryptology, Issue 34/1, 2021, ISSN 0933-2790
Publisher: Springer Verlag
DOI: 10.1007/s00145-020-09369-6

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0