Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via
To receive your credentials via mail again, please click here.
You can also access the full news archive.
a significant efficiency improvement over the large universe Key-Policy ABE systems of Lewko-Waters and Lewko. Both schemes are selectively secure in the standard model under two \"q-type\" assumptions similar to ones used in prior works. Our work brings back \"program and cancel\" techniques to this problem.
We provide implementations and benchmarks of our constructions
in Charm; a programming environment for rapid prototyping of cryptographic primitives.
payment system in which all the transactions are publicly
accessible (but in an anonymous way). We downloaded the full history
of this scheme, and analyzed many statistical properties of its
associated transaction graph. In this paper we answer for the
first time a variety of interesting questions about the typical
behavior of account owners, how they acquire and how they spend
their Bitcoins, the balance of Bitcoins they keep in their
accounts, and how they move Bitcoins between their various
accounts in order to better protect their privacy. In addition, we
isolated all the large transactions in the system, and discovered
that almost all of them are closely related to a single large
transaction that took place in November 2010, even though the
associated users apparently tried to hide this fact with many
strange looking long chains and fork-merge structures in the
compared to the modular exponentiation required in number-theoretic schemes. Courtois, Finiasz and Sendrier proposed the only practical code-based signature(CFS signature) . It can be used to realise
many cryptographic primitives. But the signature is currently not provably secure due to the existence
of the high rate distinguisher . In this paper, we make use of an alternate key-construct for the CFS
signature, and thus prove its existential unforgeability under chosen message attacks (EUF-CMA). Also,
we propose a code-based signcryption scheme and proved its security. To the best of our knowledge,
this is the first code-based, provably secure signature and signcryption scheme in literature.
Abdul-Latip et al. give a side channel attack(under the single bit leakage model) on the cipher at ISPEC 2010.Their
analysis shows that one can recover the 128-bit key of the cipher, by considering a one-bit information leakage from
the internal state after the second round, with time complexity of O(2^68) evaluations of the cipher, and data complexity
of about 2^10 chosen plaintexts.Our side channel attack improves upon the previous work of Shekh Faisal Abdul-Latip
et al. from two aspects. First, we use the Hamming weight leakage model(Suppose the Hamming weight of the lower
64 bits and the higher 64 bits of the output of the first round can be obtained without error) which is a more relaxed
leakage assumption, supported by many previously known practical results on side channel attacks, compared to the
more challenging leakage assumption that the adversary has access to the \"exact\" value of the internal state bits as
used by Shekh Faisal Abdul-Latip et al. Second, our attack has also a reduced complexity compared to that of Shekh
Faisal Abdul-Latip et al. Namely, our attack of recovering the 128-bit key of NOEKEON has a time complexity 20.1
seconds on a PC with 2.6 GHZ CPU and 8G RAM and data complexity of 99 known plaintexts; whereas, that of
Shekh Faisal Abdul-Latip et al. has time complexity of O(2^68) and needs about 2^10 chosen plaintexts.