Benjamin Wesolowski
École Polytechnique Fédérale de Lausanne
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Benjamin Wesolowski.
international cryptology conference | 2017
Ronald Cramer; Léo Ducas; Benjamin Wesolowski
The worst-case hardness of finding short vectors in ideals of cyclotomic number fields (Ideal-SVP) is a central matter in lattice based cryptography. Assuming the worst-case hardness of Ideal-SVP allows to prove the Ring-LWE and Ring-SIS assumptions, and therefore to prove the security of numerous cryptographic schemes and protocols — including key-exchange, digital signatures, public-key encryption and fully-homomorphic encryption.
International Workshop on Post-Quantum Cryptography | 2017
Alexandre Gélin; Benjamin Wesolowski
Cryptographic schemes based on supersingular isogenies have become an active area of research in the field of post-quantum cryptography. We investigate the resistance of these cryptosystems to fault injection attacks. It appears that the iterative structure of the secret isogeny computation renders these schemes vulnerable to loop-abort attacks. Loop-abort faults allow to perform a full key recovery, bypassing all the previously introduced validation methods. Therefore implementing additional countermeasures seems unavoidable for applications where physical attacks are relevant.
Cryptography and Communications | 2018
Cécile Pierrot; Benjamin Wesolowski
Trustworthy generation of public random numbers is necessary for the security of a number of cryptographic applications. It was suggested to use the inherent unpredictability of blockchains as a source of public randomness. Entropy from the Bitcoin blockchain in particular has been used in lotteries and has been suggested for a number of other applications ranging from smart contracts to election auditing. In this Arcticle, we analyse this idea and show how an adversary could manipulate these random numbers, even with limited computational power and financial budget.
International Journal of Applied Cryptography | 2017
Arjen K. Lenstra; Benjamin Wesolowski
Many applications require trustworthy generation of public random numbers. It is shown how this can be achieved using a hash function that is timed to be as slow as desired (sloth), while the correctness of the resulting hash can be verified quickly. It is shown how sloth can be used for uncontestable random number generation (unicorn), and how unicorn can be used for a new trustworthy random elliptic curves service (trx) and random-sample voting.
international conference on information security and cryptology | 2015
Benjamin Wesolowski; Pascal Junod
Broadcasting is a very efficient way to securely transmit information to a large set of geographically scattered receivers, and in practice, it is often the case that these receivers can be grouped in sets sharing common characteristics (or attributes). We describe in this paper an efficient ciphertext-policy attribute-based broadcast encryption scheme (CP-ABBE) supporting negative attributes and able to handle access policies in conjunctive normal form (CNF). Essentially, our scheme is a combination of the Boneh-Gentry-Waters broadcast encryption and of the Lewko-Sahai-Waters revocation schemes; the former is used to express attribute-based access policies while the latter is dedicated to the revocation of individual receivers. Our scheme is the first one that involves a public key and private keys having a size that is independent of the number of receivers registered in the system. Its selective security is proven with respect to the Generalized Diffie-Hellman Exponent (GDHE) problem on bilinear groups.
arXiv: Number Theory | 2017
Ernest Hunter Brooks; Dimitar Jetchev; Benjamin Wesolowski
Fix a prime number
IACR Cryptology ePrint Archive | 2015
Arjen K. Lenstra; Benjamin Wesolowski
IACR Cryptology ePrint Archive | 2016
Cécile Pierrot; Benjamin Wesolowski
\ell
arXiv: Number Theory | 2015
Dimitar Jetchev; Benjamin Wesolowski
IACR Cryptology ePrint Archive | 2016
Ernest Hunter Brooks; Dimitar Jetchev; Benjamin Wesolowski
ℓ. Graphs of isogenies of degree a power of