@inproceedings{31915f3b570f475792dd5b519a863f49,
title = "Reproducible circularly-secure bit encryption: Applications and realizations",
abstract = "We give generic constructions of several fundamental cryptographic primitives based on a new encryption primitive that combines circular security for bit encryption with the so-called reproducibility property (Bellare et al. PKC 2003). At the heart of our constructions is a novel technique which gives a way of de-randomizing reproducible public-key bitencryption schemes and also a way of reducing one-wayness conditions of a constructed trapdoor-function family (TDF) to circular security of the base scheme. The main primitives that we build from our encryption primitive include k-wise one-way TDFs (Rosen and Segev TCC 2009), CCA2- secure encryption and deterministic encryption. Our results demonstrate a new set of applications of circularly-secure encryption beyond fullyhomomorphic encryption and symbolic soundness. Finally, we show the plausibility of our assumptions by showing that the DDH-based circularlysecure scheme of Boneh et al. (Crypto 2008) and the subgroup indistinguishability based scheme of Brakerski and Goldwasser (Crypto 2010) are both reproducible.",
author = "Mohammad Hajiabadi and Kapron, {Bruce M.}",
note = "Publisher Copyright: {\textcopyright} International Association for Cryptologic Research 2015.; 35th Annual Cryptology Conference, CRYPTO 2015 ; Conference date: 16-08-2015 Through 20-08-2015",
year = "2015",
doi = "10.1007/978-3-662-47989-6_11",
language = "English (US)",
isbn = "9783662479889",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "224--243",
editor = "Matthew Robshaw and Rosario Gennaro",
booktitle = "Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings",
address = "Germany",
}