Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression View Full Text


Ontology type: schema:ScholarlyArticle      Open Access: True


Article Info

DATE

2018-01-31

AUTHORS

Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey

ABSTRACT

In typical applications of homomorphic encryption, the first step consists for Alice of encrypting some plaintext m under Bob’s public key pk\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathsf {pk}$$\end{document} and of sending the ciphertext c=HEpk(m)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$c = \mathsf {HE}_{\mathsf {pk}}(m)$$\end{document} to some third-party evaluator Charlie. This paper specifically considers that first step, i.e., the problem of transmitting c as efficiently as possible from Alice to Charlie. As others suggested before, a form of compression is achieved using hybrid encryption. Given a symmetric encryption scheme E\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathsf {E}$$\end{document}, Alice picks a random key k and sends a much smaller ciphertext c′=(HEpk(k),Ek(m))\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$c' = (\mathsf {HE}_{\mathsf {pk}}(k), \mathsf {E}_k(m))$$\end{document} that Charlie decompresses homomorphically into the original c using a decryption circuit CE-1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathcal {C}_{{\mathsf {E}^{-1}}}$$\end{document}. In this paper, we revisit that paradigm in light of its concrete implementation constraints, in particular E\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathsf {E}$$\end{document} is chosen to be an additive IV-based stream cipher. We investigate the performances offered in this context by Trivium, which belongs to the eSTREAM portfolio, and we also propose a variant with 128-bit security: Kreyvium. We show that Trivium, whose security has been firmly established for over a decade, and the new variant Kreyvium has excellent performance. We also describe a second construction, based on exponentiation in binary fields, which is impractical but sets the lowest depth record to 8\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$8$$\end{document} for 128\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$128$$\end{document}-bit security. More... »

PAGES

885-916

References to SciGraph publications

  • 2015-02-22. Computing Discrete Logarithms in and Using Magma in ARITHMETIC OF FINITE FIELDS
  • 2012-07-04. Fully homomorphic SIMD operations in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2012. Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP in ADVANCES IN CRYPTOLOGY – CRYPTO 2012
  • 2009. KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009
  • 2007-01-01. On the Security of IV Dependent Stream Ciphers in FAST SOFTWARE ENCRYPTION
  • 2005. New Applications of Time Memory Data Tradeoffs in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2005
  • 2009. Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium in FAST SOFTWARE ENCRYPTION
  • 2011. A New Variant of PMAC: Beyond the Birthday Bound in ADVANCES IN CRYPTOLOGY – CRYPTO 2011
  • 2014. Algorithms in HElib in ADVANCES IN CRYPTOLOGY – CRYPTO 2014
  • 2000-10-27. Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers in ADVANCES IN CRYPTOLOGY — ASIACRYPT 2000
  • 2003-05-13. Algebraic Attacks on Stream Ciphers with Linear Feedback in ADVANCES IN CRYPTOLOGY — EUROCRYPT 2003
  • 2014-10-08. Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2015-08-12. On Lightweight Stream Ciphers with Shorter Internal States in FAST SOFTWARE ENCRYPTION
  • 2015-03-29. On Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption Schemes in PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014
  • 2016. Minimizing the Number of Bootstrappings in Fully Homomorphic Encryption in SELECTED AREAS IN CRYPTOGRAPHY – SAC 2015
  • 2012. Conditional Differential Cryptanalysis of Trivium and KATAN in SELECTED AREAS IN CRYPTOGRAPHY
  • 2015-04-19. Match Box Meet-in-the-Middle Attack Against KATAN in FAST SOFTWARE ENCRYPTION
  • 2015-04-14. Ciphers for MPC and FHE in ADVANCES IN CRYPTOLOGY -- EUROCRYPT 2015
  • 2015-04-14. Bootstrapping for HElib in ADVANCES IN CRYPTOLOGY -- EUROCRYPT 2015
  • 2013. Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme in CRYPTOGRAPHY AND CODING
  • 2008. Trivium in NEW STREAM CIPHER DESIGNS
  • 2014. Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2014
  • 2017-08-02. Degree Evaluation of NFSR-Based Cryptosystems in ADVANCES IN CRYPTOLOGY – CRYPTO 2017
  • 2017-08-02. Cube Attacks on Non-Blackbox Polynomials Based on Division Property in ADVANCES IN CRYPTOLOGY – CRYPTO 2017
  • 2007-01-01. Towards Optimal Toom-Cook Multiplication for Univariate and Multivariate Polynomials in Characteristic 2 and 0 in ARITHMETIC OF FINITE FIELDS
  • 2014-07-08. Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks in FAST SOFTWARE ENCRYPTION
  • 2012. Homomorphic Evaluation of the AES Circuit in ADVANCES IN CRYPTOLOGY – CRYPTO 2012
  • 2014. Scale-Invariant Fully Homomorphic Encryption over the Integers in PUBLIC-KEY CRYPTOGRAPHY – PKC 2014
  • 1997. The interpolation attack on block ciphers in FAST SOFTWARE ENCRYPTION
  • 2013. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based in ADVANCES IN CRYPTOLOGY – CRYPTO 2013
  • 2014. A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2014
  • 2016-04-28. Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2016
  • 2014. A Comparison of the Homomorphic Encryption Schemes FV and YASHE in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2014
  • 2015-09-01. TriviA: A Fast and Secure Authenticated Encryption Scheme in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS -- CHES 2015
  • 2006. New Blockcipher Modes of Operation with Beyond the Birthday Bound Security in FAST SOFTWARE ENCRYPTION
  • 2016-07-21. Cryptanalysis of the FLIP Family of Stream Ciphers in ADVANCES IN CRYPTOLOGY – CRYPTO 2016
  • 1997. Cryptanalysis of Alleged A5 Stream Cipher in ADVANCES IN CRYPTOLOGY — EUROCRYPT ’97
  • 2009. Cube Attacks on Tweakable Black Box Polynomials in ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009
  • 2015-04-14. FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second in ADVANCES IN CRYPTOLOGY -- EUROCRYPT 2015
  • 2013. Batch Fully Homomorphic Encryption over the Integers in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2013
  • 2010. Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010
  • 2007-01-01. Two Trivial Attacks on Trivium in SELECTED AREAS IN CRYPTOGRAPHY
  • 2013. On the Minimal Number of Bootstrappings in Homomorphic Circuits in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2015-05-28. Homomorphic AES evaluation using the modified LTV scheme in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2013. ML Confidential: Machine Learning on Encrypted Data in INFORMATION SECURITY AND CRYPTOLOGY – ICISC 2012
  • 2015-12-30. Optimized Interpolation Attacks on LowMC in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2015
  • 2012. PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2012
  • 2016-11-09. Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2016
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s00145-017-9273-9

    DOI

    http://dx.doi.org/10.1007/s00145-017-9273-9

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1100753865


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Inria, Paris, France", 
              "id": "http://www.grid.ac/institutes/grid.5328.c", 
              "name": [
                "Inria, Paris, France"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Canteaut", 
            "givenName": "Anne", 
            "id": "sg:person.012730266023.08", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012730266023.08"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "CEA LIST, Saclay, France", 
              "id": "http://www.grid.ac/institutes/grid.457331.7", 
              "name": [
                "CEA LIST, Saclay, France"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Carpov", 
            "givenName": "Sergiu", 
            "id": "sg:person.010274176421.20", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010274176421.20"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "IMT Atlantique, Brest, France", 
              "id": "http://www.grid.ac/institutes/grid.486295.4", 
              "name": [
                "Lab-STICC, CNRS, Brest, France", 
                "IMT Atlantique, Brest, France"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Fontaine", 
            "givenName": "Caroline", 
            "id": "sg:person.07527114203.33", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07527114203.33"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "SRI International, New York, NY, USA", 
              "id": "http://www.grid.ac/institutes/grid.98913.3a", 
              "name": [
                "SRI International, New York, NY, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Lepoint", 
            "givenName": "Tancr\u00e8de", 
            "id": "sg:person.016132517751.03", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016132517751.03"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Inria, Paris, France", 
              "id": "http://www.grid.ac/institutes/grid.5328.c", 
              "name": [
                "Inria, Paris, France"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Naya-Plasencia", 
            "givenName": "Mar\u00eda", 
            "id": "sg:person.013206304341.94", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "CryptoExperts, Paris, France", 
              "id": "http://www.grid.ac/institutes/grid.470554.7", 
              "name": [
                "CryptoExperts, Paris, France"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Paillier", 
            "givenName": "Pascal", 
            "id": "sg:person.012202553435.44", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012202553435.44"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "CEA LIST, Saclay, France", 
              "id": "http://www.grid.ac/institutes/grid.457331.7", 
              "name": [
                "CEA LIST, Saclay, France"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Sirdey", 
            "givenName": "Renaud", 
            "id": "sg:person.011511456441.41", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011511456441.41"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/3-540-44448-3_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1020490931", 
              "https://doi.org/10.1007/3-540-44448-3_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11593447_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1013909474", 
              "https://doi.org/10.1007/11593447_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-68351-3_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053690204", 
              "https://doi.org/10.1007/978-3-540-68351-3_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-03317-9_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041320003", 
              "https://doi.org/10.1007/978-3-642-03317-9_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-39200-9_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1043854228", 
              "https://doi.org/10.1007/3-540-39200-9_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-06734-6_20", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038395684", 
              "https://doi.org/10.1007/978-3-319-06734-6_20"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-37682-5_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053560449", 
              "https://doi.org/10.1007/978-3-642-37682-5_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-48116-5_22", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1032917707", 
              "https://doi.org/10.1007/978-3-662-48116-5_22"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-31301-6_2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1036619867", 
              "https://doi.org/10.1007/978-3-319-31301-6_2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-54631-0_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1016653653", 
              "https://doi.org/10.1007/978-3-642-54631-0_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-74619-5_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1007864232", 
              "https://doi.org/10.1007/978-3-540-74619-5_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-73074-3_10", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1030683388", 
              "https://doi.org/10.1007/978-3-540-73074-3_10"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-48800-3_22", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023561970", 
              "https://doi.org/10.1007/978-3-662-48800-3_22"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-46706-0_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1001187988", 
              "https://doi.org/10.1007/978-3-662-46706-0_4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-46800-5_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034979592", 
              "https://doi.org/10.1007/978-3-662-46800-5_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11799313_20", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1012144447", 
              "https://doi.org/10.1007/11799313_20"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-77360-3_3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1025120353", 
              "https://doi.org/10.1007/978-3-540-77360-3_3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-45611-8_20", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023590403", 
              "https://doi.org/10.1007/978-3-662-45611-8_20"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-34961-4_14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1005407960", 
              "https://doi.org/10.1007/978-3-642-34961-4_14"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-32009-5_50", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1025522627", 
              "https://doi.org/10.1007/978-3-642-32009-5_50"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-69053-0_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1028362929", 
              "https://doi.org/10.1007/3-540-69053-0_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10623-012-9720-4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1015871561", 
              "https://doi.org/10.1007/s10623-012-9720-4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-63697-9_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1091024676", 
              "https://doi.org/10.1007/978-3-319-63697-9_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-17373-8_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017495732", 
              "https://doi.org/10.1007/978-3-642-17373-8_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-44774-1_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1045620656", 
              "https://doi.org/10.1007/978-3-662-44774-1_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-22792-9_34", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053299650", 
              "https://doi.org/10.1007/978-3-642-22792-9_34"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-46800-5_24", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037378777", 
              "https://doi.org/10.1007/978-3-662-46800-5_24"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-49890-3_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014166962", 
              "https://doi.org/10.1007/978-3-662-49890-3_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-41320-9_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1028621484", 
              "https://doi.org/10.1007/978-3-642-41320-9_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-16277-5_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1040756420", 
              "https://doi.org/10.1007/978-3-319-16277-5_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-46800-5_25", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1042169019", 
              "https://doi.org/10.1007/978-3-662-46800-5_25"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-53887-6_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1084896599", 
              "https://doi.org/10.1007/978-3-662-53887-6_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-01001-9_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052713322", 
              "https://doi.org/10.1007/978-3-642-01001-9_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10623-015-0095-1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1011696819", 
              "https://doi.org/10.1007/s10623-015-0095-1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-48324-4_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023467432", 
              "https://doi.org/10.1007/978-3-662-48324-4_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-44371-2_31", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1003203986", 
              "https://doi.org/10.1007/978-3-662-44371-2_31"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-43933-3_26", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1036102667", 
              "https://doi.org/10.1007/978-3-662-43933-3_26"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-16295-9_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014377131", 
              "https://doi.org/10.1007/978-3-319-16295-9_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-32009-5_49", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1011363442", 
              "https://doi.org/10.1007/978-3-642-32009-5_49"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-55220-5_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1033678828", 
              "https://doi.org/10.1007/978-3-642-55220-5_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-04138-9_20", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1049385172", 
              "https://doi.org/10.1007/978-3-642-04138-9_20"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-53018-4_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1022089464", 
              "https://doi.org/10.1007/978-3-662-53018-4_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bfb0052332", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034734300", 
              "https://doi.org/10.1007/bfb0052332"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-45239-0_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1042526343", 
              "https://doi.org/10.1007/978-3-642-45239-0_4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-28496-0_12", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1020197941", 
              "https://doi.org/10.1007/978-3-642-28496-0_12"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-38348-9_20", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1045575939", 
              "https://doi.org/10.1007/978-3-642-38348-9_20"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-40041-4_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006864000", 
              "https://doi.org/10.1007/978-3-642-40041-4_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-63697-9_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1091024677", 
              "https://doi.org/10.1007/978-3-319-63697-9_9"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2018-01-31", 
        "datePublishedReg": "2018-01-31", 
        "description": "In typical applications of homomorphic encryption, the first step consists for Alice of encrypting some plaintext m under Bob\u2019s public key pk\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$\\mathsf {pk}$$\\end{document} and of sending the ciphertext c=HEpk(m)\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$c = \\mathsf {HE}_{\\mathsf {pk}}(m)$$\\end{document} to some third-party evaluator Charlie. This paper specifically considers that first step, i.e., the problem of transmitting c as efficiently as possible from Alice to Charlie. As others suggested before, a form of compression is achieved using hybrid encryption. Given a symmetric encryption scheme E\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$\\mathsf {E}$$\\end{document}, Alice picks a random key k and sends a much smaller ciphertext c\u2032=(HEpk(k),Ek(m))\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$c' = (\\mathsf {HE}_{\\mathsf {pk}}(k), \\mathsf {E}_k(m))$$\\end{document} that Charlie decompresses homomorphically into the original c using a decryption circuit CE-1\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$\\mathcal {C}_{{\\mathsf {E}^{-1}}}$$\\end{document}. In this paper, we revisit that paradigm in light of its concrete implementation constraints, in particular E\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$\\mathsf {E}$$\\end{document} is chosen to be an additive IV-based stream cipher. We investigate the performances offered in this context by Trivium, which belongs to the eSTREAM portfolio, and we also propose a variant with 128-bit security: Kreyvium. We show that Trivium, whose security has been firmly established for over a decade, and the new variant Kreyvium has excellent performance. We also describe a second construction, based on exponentiation in binary fields, which is impractical but sets the lowest depth record to 8\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$8$$\\end{document} for 128\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$128$$\\end{document}-bit security.", 
        "genre": "article", 
        "id": "sg:pub.10.1007/s00145-017-9273-9", 
        "isAccessibleForFree": true, 
        "isFundedItemOf": [
          {
            "id": "sg:grant.3939743", 
            "type": "MonetaryGrant"
          }
        ], 
        "isPartOf": [
          {
            "id": "sg:journal.1136278", 
            "issn": [
              "0933-2790", 
              "1432-1378"
            ], 
            "name": "Journal of Cryptology", 
            "publisher": "Springer Nature", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "3", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "31"
          }
        ], 
        "keywords": [
          "typical applications", 
          "applications", 
          "encryption", 
          "first step", 
          "hybrid encryption", 
          "symmetric encryption scheme", 
          "smaller ciphertext", 
          "implementation constraints", 
          "stream cipher", 
          "performance", 
          "security", 
          "excellent performance", 
          "practical solution", 
          "homomorphic encryption", 
          "step", 
          "Alice", 
          "plaintext", 
          "Bob", 
          "ciphertext C", 
          "Charlie", 
          "paper", 
          "problem", 
          "form of compression", 
          "form", 
          "compression", 
          "encryption scheme", 
          "scheme", 
          "random key k", 
          "key K", 
          "ciphertext", 
          "Ce", 
          "paradigm", 
          "light", 
          "constraints", 
          "cipher", 
          "context", 
          "Trivium", 
          "portfolio", 
          "variants", 
          "Kreyvium", 
          "decades", 
          "second construction", 
          "construction", 
          "exponentiation", 
          "binary field", 
          "field", 
          "depth records", 
          "records", 
          "bit security", 
          "solution"
        ], 
        "name": "Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression", 
        "pagination": "885-916", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1100753865"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s00145-017-9273-9"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s00145-017-9273-9", 
          "https://app.dimensions.ai/details/publication/pub.1100753865"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2022-10-01T06:44", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20221001/entities/gbq_results/article/article_781.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://doi.org/10.1007/s00145-017-9273-9"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s00145-017-9273-9'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s00145-017-9273-9'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s00145-017-9273-9'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s00145-017-9273-9'


     

    This table displays all metadata directly associated to this object as RDF triples.

    356 TRIPLES      21 PREDICATES      122 URIs      66 LITERALS      6 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s00145-017-9273-9 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author Na0c979be3a264979986c58cc50908c19
    4 schema:citation sg:pub.10.1007/11593447_19
    5 sg:pub.10.1007/11799313_20
    6 sg:pub.10.1007/3-540-39200-9_21
    7 sg:pub.10.1007/3-540-44448-3_1
    8 sg:pub.10.1007/3-540-69053-0_17
    9 sg:pub.10.1007/978-3-319-06734-6_20
    10 sg:pub.10.1007/978-3-319-16277-5_1
    11 sg:pub.10.1007/978-3-319-16295-9_13
    12 sg:pub.10.1007/978-3-319-31301-6_2
    13 sg:pub.10.1007/978-3-319-63697-9_8
    14 sg:pub.10.1007/978-3-319-63697-9_9
    15 sg:pub.10.1007/978-3-540-68351-3_18
    16 sg:pub.10.1007/978-3-540-73074-3_10
    17 sg:pub.10.1007/978-3-540-74619-5_17
    18 sg:pub.10.1007/978-3-540-77360-3_3
    19 sg:pub.10.1007/978-3-642-01001-9_16
    20 sg:pub.10.1007/978-3-642-03317-9_1
    21 sg:pub.10.1007/978-3-642-04138-9_20
    22 sg:pub.10.1007/978-3-642-17373-8_8
    23 sg:pub.10.1007/978-3-642-22792-9_34
    24 sg:pub.10.1007/978-3-642-28496-0_12
    25 sg:pub.10.1007/978-3-642-32009-5_49
    26 sg:pub.10.1007/978-3-642-32009-5_50
    27 sg:pub.10.1007/978-3-642-34961-4_14
    28 sg:pub.10.1007/978-3-642-37682-5_1
    29 sg:pub.10.1007/978-3-642-38348-9_20
    30 sg:pub.10.1007/978-3-642-40041-4_5
    31 sg:pub.10.1007/978-3-642-41320-9_13
    32 sg:pub.10.1007/978-3-642-45239-0_4
    33 sg:pub.10.1007/978-3-642-54631-0_18
    34 sg:pub.10.1007/978-3-642-55220-5_1
    35 sg:pub.10.1007/978-3-662-43933-3_26
    36 sg:pub.10.1007/978-3-662-44371-2_31
    37 sg:pub.10.1007/978-3-662-44774-1_17
    38 sg:pub.10.1007/978-3-662-45611-8_20
    39 sg:pub.10.1007/978-3-662-46706-0_4
    40 sg:pub.10.1007/978-3-662-46800-5_17
    41 sg:pub.10.1007/978-3-662-46800-5_24
    42 sg:pub.10.1007/978-3-662-46800-5_25
    43 sg:pub.10.1007/978-3-662-48116-5_22
    44 sg:pub.10.1007/978-3-662-48324-4_17
    45 sg:pub.10.1007/978-3-662-48800-3_22
    46 sg:pub.10.1007/978-3-662-49890-3_13
    47 sg:pub.10.1007/978-3-662-53018-4_17
    48 sg:pub.10.1007/978-3-662-53887-6_1
    49 sg:pub.10.1007/bfb0052332
    50 sg:pub.10.1007/s10623-012-9720-4
    51 sg:pub.10.1007/s10623-015-0095-1
    52 schema:datePublished 2018-01-31
    53 schema:datePublishedReg 2018-01-31
    54 schema:description In typical applications of homomorphic encryption, the first step consists for Alice of encrypting some plaintext m under Bob’s public key pk\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathsf {pk}$$\end{document} and of sending the ciphertext c=HEpk(m)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$c = \mathsf {HE}_{\mathsf {pk}}(m)$$\end{document} to some third-party evaluator Charlie. This paper specifically considers that first step, i.e., the problem of transmitting c as efficiently as possible from Alice to Charlie. As others suggested before, a form of compression is achieved using hybrid encryption. Given a symmetric encryption scheme E\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathsf {E}$$\end{document}, Alice picks a random key k and sends a much smaller ciphertext c′=(HEpk(k),Ek(m))\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$c' = (\mathsf {HE}_{\mathsf {pk}}(k), \mathsf {E}_k(m))$$\end{document} that Charlie decompresses homomorphically into the original c using a decryption circuit CE-1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathcal {C}_{{\mathsf {E}^{-1}}}$$\end{document}. In this paper, we revisit that paradigm in light of its concrete implementation constraints, in particular E\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathsf {E}$$\end{document} is chosen to be an additive IV-based stream cipher. We investigate the performances offered in this context by Trivium, which belongs to the eSTREAM portfolio, and we also propose a variant with 128-bit security: Kreyvium. We show that Trivium, whose security has been firmly established for over a decade, and the new variant Kreyvium has excellent performance. We also describe a second construction, based on exponentiation in binary fields, which is impractical but sets the lowest depth record to 8\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$8$$\end{document} for 128\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$128$$\end{document}-bit security.
    55 schema:genre article
    56 schema:isAccessibleForFree true
    57 schema:isPartOf N1e1f731476884523a43e8cb85af0c98c
    58 Nf5d60cd056014997b218cba21763819d
    59 sg:journal.1136278
    60 schema:keywords Alice
    61 Bob
    62 Ce
    63 Charlie
    64 Kreyvium
    65 Trivium
    66 applications
    67 binary field
    68 bit security
    69 cipher
    70 ciphertext
    71 ciphertext C
    72 compression
    73 constraints
    74 construction
    75 context
    76 decades
    77 depth records
    78 encryption
    79 encryption scheme
    80 excellent performance
    81 exponentiation
    82 field
    83 first step
    84 form
    85 form of compression
    86 homomorphic encryption
    87 hybrid encryption
    88 implementation constraints
    89 key K
    90 light
    91 paper
    92 paradigm
    93 performance
    94 plaintext
    95 portfolio
    96 practical solution
    97 problem
    98 random key k
    99 records
    100 scheme
    101 second construction
    102 security
    103 smaller ciphertext
    104 solution
    105 step
    106 stream cipher
    107 symmetric encryption scheme
    108 typical applications
    109 variants
    110 schema:name Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
    111 schema:pagination 885-916
    112 schema:productId N0e1cdde6e4a14a8ab4c3ab5b6e553cfc
    113 N709949e947ef4522a0b3070e2e8fef9f
    114 schema:sameAs https://app.dimensions.ai/details/publication/pub.1100753865
    115 https://doi.org/10.1007/s00145-017-9273-9
    116 schema:sdDatePublished 2022-10-01T06:44
    117 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    118 schema:sdPublisher N6c70c7e1953941ddbf5f5b26db73a606
    119 schema:url https://doi.org/10.1007/s00145-017-9273-9
    120 sgo:license sg:explorer/license/
    121 sgo:sdDataset articles
    122 rdf:type schema:ScholarlyArticle
    123 N0159dbb1975b465fb1546df220e8fd52 rdf:first sg:person.010274176421.20
    124 rdf:rest Ncd5e852fbc38432bac2ee7975c774dda
    125 N0e1cdde6e4a14a8ab4c3ab5b6e553cfc schema:name dimensions_id
    126 schema:value pub.1100753865
    127 rdf:type schema:PropertyValue
    128 N1e1f731476884523a43e8cb85af0c98c schema:issueNumber 3
    129 rdf:type schema:PublicationIssue
    130 N3766e3e52cbf4b7a923f17395404b86c rdf:first sg:person.016132517751.03
    131 rdf:rest Nbaff387579a24744ba1312b7f737c69c
    132 N6c70c7e1953941ddbf5f5b26db73a606 schema:name Springer Nature - SN SciGraph project
    133 rdf:type schema:Organization
    134 N709949e947ef4522a0b3070e2e8fef9f schema:name doi
    135 schema:value 10.1007/s00145-017-9273-9
    136 rdf:type schema:PropertyValue
    137 N8a7eed08b0b64107a8b7ea350cce77b4 rdf:first sg:person.012202553435.44
    138 rdf:rest N9344a5d5ecb84f5e9e352dbcc1c748b4
    139 N9344a5d5ecb84f5e9e352dbcc1c748b4 rdf:first sg:person.011511456441.41
    140 rdf:rest rdf:nil
    141 Na0c979be3a264979986c58cc50908c19 rdf:first sg:person.012730266023.08
    142 rdf:rest N0159dbb1975b465fb1546df220e8fd52
    143 Nbaff387579a24744ba1312b7f737c69c rdf:first sg:person.013206304341.94
    144 rdf:rest N8a7eed08b0b64107a8b7ea350cce77b4
    145 Ncd5e852fbc38432bac2ee7975c774dda rdf:first sg:person.07527114203.33
    146 rdf:rest N3766e3e52cbf4b7a923f17395404b86c
    147 Nf5d60cd056014997b218cba21763819d schema:volumeNumber 31
    148 rdf:type schema:PublicationVolume
    149 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    150 schema:name Information and Computing Sciences
    151 rdf:type schema:DefinedTerm
    152 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    153 schema:name Data Format
    154 rdf:type schema:DefinedTerm
    155 sg:grant.3939743 http://pending.schema.org/fundedItem sg:pub.10.1007/s00145-017-9273-9
    156 rdf:type schema:MonetaryGrant
    157 sg:journal.1136278 schema:issn 0933-2790
    158 1432-1378
    159 schema:name Journal of Cryptology
    160 schema:publisher Springer Nature
    161 rdf:type schema:Periodical
    162 sg:person.010274176421.20 schema:affiliation grid-institutes:grid.457331.7
    163 schema:familyName Carpov
    164 schema:givenName Sergiu
    165 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010274176421.20
    166 rdf:type schema:Person
    167 sg:person.011511456441.41 schema:affiliation grid-institutes:grid.457331.7
    168 schema:familyName Sirdey
    169 schema:givenName Renaud
    170 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011511456441.41
    171 rdf:type schema:Person
    172 sg:person.012202553435.44 schema:affiliation grid-institutes:grid.470554.7
    173 schema:familyName Paillier
    174 schema:givenName Pascal
    175 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012202553435.44
    176 rdf:type schema:Person
    177 sg:person.012730266023.08 schema:affiliation grid-institutes:grid.5328.c
    178 schema:familyName Canteaut
    179 schema:givenName Anne
    180 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012730266023.08
    181 rdf:type schema:Person
    182 sg:person.013206304341.94 schema:affiliation grid-institutes:grid.5328.c
    183 schema:familyName Naya-Plasencia
    184 schema:givenName María
    185 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94
    186 rdf:type schema:Person
    187 sg:person.016132517751.03 schema:affiliation grid-institutes:grid.98913.3a
    188 schema:familyName Lepoint
    189 schema:givenName Tancrède
    190 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016132517751.03
    191 rdf:type schema:Person
    192 sg:person.07527114203.33 schema:affiliation grid-institutes:grid.486295.4
    193 schema:familyName Fontaine
    194 schema:givenName Caroline
    195 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07527114203.33
    196 rdf:type schema:Person
    197 sg:pub.10.1007/11593447_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013909474
    198 https://doi.org/10.1007/11593447_19
    199 rdf:type schema:CreativeWork
    200 sg:pub.10.1007/11799313_20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012144447
    201 https://doi.org/10.1007/11799313_20
    202 rdf:type schema:CreativeWork
    203 sg:pub.10.1007/3-540-39200-9_21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1043854228
    204 https://doi.org/10.1007/3-540-39200-9_21
    205 rdf:type schema:CreativeWork
    206 sg:pub.10.1007/3-540-44448-3_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020490931
    207 https://doi.org/10.1007/3-540-44448-3_1
    208 rdf:type schema:CreativeWork
    209 sg:pub.10.1007/3-540-69053-0_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028362929
    210 https://doi.org/10.1007/3-540-69053-0_17
    211 rdf:type schema:CreativeWork
    212 sg:pub.10.1007/978-3-319-06734-6_20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038395684
    213 https://doi.org/10.1007/978-3-319-06734-6_20
    214 rdf:type schema:CreativeWork
    215 sg:pub.10.1007/978-3-319-16277-5_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040756420
    216 https://doi.org/10.1007/978-3-319-16277-5_1
    217 rdf:type schema:CreativeWork
    218 sg:pub.10.1007/978-3-319-16295-9_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014377131
    219 https://doi.org/10.1007/978-3-319-16295-9_13
    220 rdf:type schema:CreativeWork
    221 sg:pub.10.1007/978-3-319-31301-6_2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1036619867
    222 https://doi.org/10.1007/978-3-319-31301-6_2
    223 rdf:type schema:CreativeWork
    224 sg:pub.10.1007/978-3-319-63697-9_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1091024676
    225 https://doi.org/10.1007/978-3-319-63697-9_8
    226 rdf:type schema:CreativeWork
    227 sg:pub.10.1007/978-3-319-63697-9_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1091024677
    228 https://doi.org/10.1007/978-3-319-63697-9_9
    229 rdf:type schema:CreativeWork
    230 sg:pub.10.1007/978-3-540-68351-3_18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053690204
    231 https://doi.org/10.1007/978-3-540-68351-3_18
    232 rdf:type schema:CreativeWork
    233 sg:pub.10.1007/978-3-540-73074-3_10 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030683388
    234 https://doi.org/10.1007/978-3-540-73074-3_10
    235 rdf:type schema:CreativeWork
    236 sg:pub.10.1007/978-3-540-74619-5_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007864232
    237 https://doi.org/10.1007/978-3-540-74619-5_17
    238 rdf:type schema:CreativeWork
    239 sg:pub.10.1007/978-3-540-77360-3_3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1025120353
    240 https://doi.org/10.1007/978-3-540-77360-3_3
    241 rdf:type schema:CreativeWork
    242 sg:pub.10.1007/978-3-642-01001-9_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052713322
    243 https://doi.org/10.1007/978-3-642-01001-9_16
    244 rdf:type schema:CreativeWork
    245 sg:pub.10.1007/978-3-642-03317-9_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041320003
    246 https://doi.org/10.1007/978-3-642-03317-9_1
    247 rdf:type schema:CreativeWork
    248 sg:pub.10.1007/978-3-642-04138-9_20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1049385172
    249 https://doi.org/10.1007/978-3-642-04138-9_20
    250 rdf:type schema:CreativeWork
    251 sg:pub.10.1007/978-3-642-17373-8_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017495732
    252 https://doi.org/10.1007/978-3-642-17373-8_8
    253 rdf:type schema:CreativeWork
    254 sg:pub.10.1007/978-3-642-22792-9_34 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053299650
    255 https://doi.org/10.1007/978-3-642-22792-9_34
    256 rdf:type schema:CreativeWork
    257 sg:pub.10.1007/978-3-642-28496-0_12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020197941
    258 https://doi.org/10.1007/978-3-642-28496-0_12
    259 rdf:type schema:CreativeWork
    260 sg:pub.10.1007/978-3-642-32009-5_49 schema:sameAs https://app.dimensions.ai/details/publication/pub.1011363442
    261 https://doi.org/10.1007/978-3-642-32009-5_49
    262 rdf:type schema:CreativeWork
    263 sg:pub.10.1007/978-3-642-32009-5_50 schema:sameAs https://app.dimensions.ai/details/publication/pub.1025522627
    264 https://doi.org/10.1007/978-3-642-32009-5_50
    265 rdf:type schema:CreativeWork
    266 sg:pub.10.1007/978-3-642-34961-4_14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005407960
    267 https://doi.org/10.1007/978-3-642-34961-4_14
    268 rdf:type schema:CreativeWork
    269 sg:pub.10.1007/978-3-642-37682-5_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053560449
    270 https://doi.org/10.1007/978-3-642-37682-5_1
    271 rdf:type schema:CreativeWork
    272 sg:pub.10.1007/978-3-642-38348-9_20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045575939
    273 https://doi.org/10.1007/978-3-642-38348-9_20
    274 rdf:type schema:CreativeWork
    275 sg:pub.10.1007/978-3-642-40041-4_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006864000
    276 https://doi.org/10.1007/978-3-642-40041-4_5
    277 rdf:type schema:CreativeWork
    278 sg:pub.10.1007/978-3-642-41320-9_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028621484
    279 https://doi.org/10.1007/978-3-642-41320-9_13
    280 rdf:type schema:CreativeWork
    281 sg:pub.10.1007/978-3-642-45239-0_4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042526343
    282 https://doi.org/10.1007/978-3-642-45239-0_4
    283 rdf:type schema:CreativeWork
    284 sg:pub.10.1007/978-3-642-54631-0_18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016653653
    285 https://doi.org/10.1007/978-3-642-54631-0_18
    286 rdf:type schema:CreativeWork
    287 sg:pub.10.1007/978-3-642-55220-5_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033678828
    288 https://doi.org/10.1007/978-3-642-55220-5_1
    289 rdf:type schema:CreativeWork
    290 sg:pub.10.1007/978-3-662-43933-3_26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1036102667
    291 https://doi.org/10.1007/978-3-662-43933-3_26
    292 rdf:type schema:CreativeWork
    293 sg:pub.10.1007/978-3-662-44371-2_31 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003203986
    294 https://doi.org/10.1007/978-3-662-44371-2_31
    295 rdf:type schema:CreativeWork
    296 sg:pub.10.1007/978-3-662-44774-1_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045620656
    297 https://doi.org/10.1007/978-3-662-44774-1_17
    298 rdf:type schema:CreativeWork
    299 sg:pub.10.1007/978-3-662-45611-8_20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023590403
    300 https://doi.org/10.1007/978-3-662-45611-8_20
    301 rdf:type schema:CreativeWork
    302 sg:pub.10.1007/978-3-662-46706-0_4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001187988
    303 https://doi.org/10.1007/978-3-662-46706-0_4
    304 rdf:type schema:CreativeWork
    305 sg:pub.10.1007/978-3-662-46800-5_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034979592
    306 https://doi.org/10.1007/978-3-662-46800-5_17
    307 rdf:type schema:CreativeWork
    308 sg:pub.10.1007/978-3-662-46800-5_24 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037378777
    309 https://doi.org/10.1007/978-3-662-46800-5_24
    310 rdf:type schema:CreativeWork
    311 sg:pub.10.1007/978-3-662-46800-5_25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042169019
    312 https://doi.org/10.1007/978-3-662-46800-5_25
    313 rdf:type schema:CreativeWork
    314 sg:pub.10.1007/978-3-662-48116-5_22 schema:sameAs https://app.dimensions.ai/details/publication/pub.1032917707
    315 https://doi.org/10.1007/978-3-662-48116-5_22
    316 rdf:type schema:CreativeWork
    317 sg:pub.10.1007/978-3-662-48324-4_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023467432
    318 https://doi.org/10.1007/978-3-662-48324-4_17
    319 rdf:type schema:CreativeWork
    320 sg:pub.10.1007/978-3-662-48800-3_22 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023561970
    321 https://doi.org/10.1007/978-3-662-48800-3_22
    322 rdf:type schema:CreativeWork
    323 sg:pub.10.1007/978-3-662-49890-3_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014166962
    324 https://doi.org/10.1007/978-3-662-49890-3_13
    325 rdf:type schema:CreativeWork
    326 sg:pub.10.1007/978-3-662-53018-4_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022089464
    327 https://doi.org/10.1007/978-3-662-53018-4_17
    328 rdf:type schema:CreativeWork
    329 sg:pub.10.1007/978-3-662-53887-6_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1084896599
    330 https://doi.org/10.1007/978-3-662-53887-6_1
    331 rdf:type schema:CreativeWork
    332 sg:pub.10.1007/bfb0052332 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034734300
    333 https://doi.org/10.1007/bfb0052332
    334 rdf:type schema:CreativeWork
    335 sg:pub.10.1007/s10623-012-9720-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015871561
    336 https://doi.org/10.1007/s10623-012-9720-4
    337 rdf:type schema:CreativeWork
    338 sg:pub.10.1007/s10623-015-0095-1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1011696819
    339 https://doi.org/10.1007/s10623-015-0095-1
    340 rdf:type schema:CreativeWork
    341 grid-institutes:grid.457331.7 schema:alternateName CEA LIST, Saclay, France
    342 schema:name CEA LIST, Saclay, France
    343 rdf:type schema:Organization
    344 grid-institutes:grid.470554.7 schema:alternateName CryptoExperts, Paris, France
    345 schema:name CryptoExperts, Paris, France
    346 rdf:type schema:Organization
    347 grid-institutes:grid.486295.4 schema:alternateName IMT Atlantique, Brest, France
    348 schema:name IMT Atlantique, Brest, France
    349 Lab-STICC, CNRS, Brest, France
    350 rdf:type schema:Organization
    351 grid-institutes:grid.5328.c schema:alternateName Inria, Paris, France
    352 schema:name Inria, Paris, France
    353 rdf:type schema:Organization
    354 grid-institutes:grid.98913.3a schema:alternateName SRI International, New York, NY, USA
    355 schema:name SRI International, New York, NY, USA
    356 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...