Skip to main content

Showing 1–9 of 9 results for author: Duong, D H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2012.15423  [pdf, other

    cs.CR

    Lattice-based Signcryption with Equality Test in Standard Model

    Authors: Huy Quoc Le, Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto

    Abstract: A signcryption, which is an integration of a public key encryption and a digital signature, can provide confidentiality and authenticity simultaneously. Additionally, a signcryption associated with equality test allows a third party (e.g., a cloud server) to check whether or not two ciphertexts are encrypted from the same message without knowing the message. This application plays an important rol… ▽ More

    Submitted 30 December, 2020; originally announced December 2020.

  2. arXiv:2011.08456  [pdf, ps, other

    cs.CR

    Collusion-Resistant Identity-based Proxy Re-Encryption: Lattice-based Constructions in Standard Model

    Authors: Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Partha Sarathi Roy

    Abstract: The concept of proxy re-encryption (PRE) dates back to the work of Blaze, Bleumer, and Strauss in 1998. PRE offers delegation of decryption rights, i.e., it securely enables the re-encryption of ciphertexts from one key to another, without relying on trusted parties. PRE allows a semi-trusted third party termed as a ``proxy" to securely divert encrypted files of user A (delegator) to user B (deleg… ▽ More

    Submitted 16 November, 2020; originally announced November 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:2005.06741

  3. arXiv:2010.14077  [pdf, ps, other

    cs.CR

    Lattice-based IBE with Equality Test Supporting Flexible Authorization in the Standard Model

    Authors: Giang L. D. Nguyen, Willy Susilo, Dung Hoang Duong, Huy Quoc Le, Fuchun Guo

    Abstract: Identity-based encryption with equality test supporting flexible authorization (IBEET-FA) allows the equality test of underlying messages of two ciphertexts while strengthens privacy protection by allowing users (identities) to control the comparison of their ciphertexts with others. IBEET by itself has a wide range of useful applicable domain such as keyword search on encrypted data, database par… ▽ More

    Submitted 26 October, 2020; originally announced October 2020.

    Comments: To appear in IndoCrypt 2020. arXiv admin note: text overlap with arXiv:2005.03178

  4. arXiv:2007.06884  [pdf, ps, other

    cs.CR

    Lattice Blind Signatures with Forward Security

    Authors: Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Ha Thanh Nguyen Tran, Viet Cuong Trinh, Josef Pieprzyk, Thomas Plantard

    Abstract: Blind signatures play an important role in both electronic cash and electronic voting systems. Blind signatures should be secure against various attacks (such as signature forgeries). The work puts a special attention to secret key exposure attacks, which totally break digital signatures. Signatures that resist secret key exposure attacks are called forward secure in the sense that disclosure of a… ▽ More

    Submitted 14 July, 2020; originally announced July 2020.

    Comments: ACISP 2020

  5. arXiv:2007.06881  [pdf, ps, other

    cs.CR

    Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model

    Authors: Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Josef Pieprzyk

    Abstract: At CRYPTO 2017, Rosca, Sakzad, Stehle and Steinfeld introduced the Middle--Product LWE (MPLWE) assumption which is as secure as Polynomial-LWE for a large class of polynomials, making the corresponding cryptographic schemes more flexible in choosing the underlying polynomial ring in design while still kee** the equivalent efficiency. Recently at TCC 2019, Lombardi, Vaikuntanathan and Vuong intro… ▽ More

    Submitted 14 July, 2020; originally announced July 2020.

    Comments: ACNS 2020

  6. arXiv:2007.06353  [pdf, ps, other

    cs.CR

    Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption

    Authors: Willy Susilo, Dung Hoang Duong, Huy Quoc Le, Josef Pieprzyk

    Abstract: Puncturable encryption (PE), proposed by Green and Miers at IEEE S&P 2015, is a kind of public key encryption that allows recipients to revoke individual messages by repeatedly updating decryption keys without communicating with senders. PE is an essential tool for constructing many interesting applications, such as asynchronous messaging systems, forward-secret zero round-trip time protocols, pub… ▽ More

    Submitted 13 July, 2020; originally announced July 2020.

  7. arXiv:2005.06741  [pdf, ps, other

    cs.CR

    Lattice-based Unidirectional IBPRE Secure in Standard Model

    Authors: Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Joonsang Baek, Partha Sarathi Roy

    Abstract: Proxy re-encryption (PRE) securely enables the re-encryption of ciphertexts from one key to another, without relying on trusted parties, i.e., it offers delegation of decryption rights. PRE allows a semi-trusted third party termed as a "proxy" to securely divert encrypted files of user A (delegator) to user B (delegatee) without revealing any information about the underlying files to the proxy. To… ▽ More

    Submitted 14 May, 2020; originally announced May 2020.

  8. arXiv:2005.05308  [pdf, ps, other

    cs.CR

    Lattice-based public key encryption with equality test supporting flexible authorization in standard model

    Authors: Dung Hoang Duong, Kazuhide Fukushima, Shinsaku Kiyomoto, Partha Sarathi Roy, Arnaud Sipasseuth, Willy Susilo

    Abstract: Public key encryption with equality test (PKEET) supports to check whether two ciphertexts encrypted under different public keys contain the same message or not. PKEET has many interesting applications such as keyword search on encrypted data, encrypted data partitioning for efficient encrypted data management, personal health record systems, spam filtering in encrypted email systems and so on. Ho… ▽ More

    Submitted 9 May, 2020; originally announced May 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:2005.03178

  9. arXiv:2005.03178  [pdf, ps, other

    cs.CR

    CCA2-secure Lattice-based Public Key Encryption with Equality Test in Standard Model

    Authors: Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto, Arnaud Sipasseuth

    Abstract: With the rapid growth of cloud storage and cloud computing services, many organisations and users choose to store the data on a cloud server for saving costs. However, due to security concerns, data of users would be encrypted before sending to the cloud. However, this hinders a problem of computation on encrypted data in the cloud, especially in the case of performing data matching in various med… ▽ More

    Submitted 31 January, 2021; v1 submitted 6 May, 2020; originally announced May 2020.

    Comments: 23 pages, full version of https://link.springer.com/chapter/10.1007%2F978-3-030-21548-4_8