Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Gareth T. Davies is active.

Publication


Featured researches published by Gareth T. Davies.


public key cryptography | 2014

Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks

Florian Böhl; Gareth T. Davies; Dennis Hofheinz

We construct secret-key encryption SKE schemes that are secure against related-key attacks and in the presence of key-dependent messages RKA-KDM secure. We emphasize that RKA-KDM security is not merely the conjunction of individual security properties, but covers attacks in which ciphertexts of key-dependent messages under related keys are available. Besides being interesting in their own right, RKA-KDM secure schemes allow to garble circuits with XORs very efficiently Applebaum, TCC 2013. Until now, the only known RKA-KDM secure SKE scheme due to Applebaum is based on the LPN assumption. Our schemes are based on various other computational assumptions, namely DDH, LWE, QR, and DCR. We abstract from Applebaums construction and proof, and formalize three generic technical properties that imply RKA-KDM security: one property is IND-CPA security, and the other two are the existence of suitable oracles that produce ciphertexts under related keys, resp.i¾?of key-dependent messages. We then give simple SKE schemes that achieve these properties. Our constructions are variants of known KDM-secure public-key encryption schemes. To additionally achieve RKA security, we isolate suitable homomorphic properties of the underlying schemes in order to simulate ciphertexts under related keys in the security proof. RKA-KDM security for our schemes holds w.r.t. affine functions over the respective mathematical domain. From a conceptual point of view, our work provides a generic and extensible way to construct encryption schemes with multiple special security properties.


the cryptographers’ track at the rsa conference | 2014

KDM Security in the Hybrid Framework

Gareth T. Davies; Martijn Stam

We study the natural question of how well suited the hybrid encryption paradigm is in the context of key-dependent message (KDM) attacks. We prove that if a key derivation function (KDF) is used in between the public (KEM) and symmetric (DEM) part of the hybrid scheme and this KDF is modelled as a random oracle, then one-wayness of the KEM and indistinguishability of the DEM together suffice for KDM security of the resulting hybrid scheme. We consider the most general scenario, namely CCA attacks and KDM functions that can call the random oracle. Although the result itself is not entirely unsuspected—it does solve an open problem from Black, Rogaway, and Shrimpton (SAC 2002)—proving it is considerably less straightforward; we develop some proof techniques that might be applicable in a wider context.


computer and communications security | 2017

Side Channels in Deduplication: Trade-offs between Leakage and Efficiency

Frederik Armknecht; Colin Boyd; Gareth T. Davies; Kristian Gjøsteen; Mohsen Toorani

Deduplication removes redundant copies of files or data blocks stored on the cloud. Client-side deduplication, where the client only uploads the file upon the request of the server, provides major storage and bandwidth savings, but introduces a number of security concerns. Harnik et al. (2010) showed how cross-user client-side deduplication inherently gives the adversary access to a (noisy) side-channel that may divulge whether or not a particular file is stored on the server, leading to leakage of user information. We provide formal definitions for deduplication strategies and their security in terms of adversarial advantage. Using these definitions, we provide a criterion for designing good strategies and then prove a bound characterizing the necessary trade-off between security and efficiency.


availability, reliability and security | 2018

Definitions for Plaintext-Existence Hiding in Cloud Storage

Colin Boyd; Gareth T. Davies; Kristian Gjøsteen; Håvard Raddum; Mohsen Toorani

Cloud storage services use deduplication for saving bandwidth and storage. An adversary can exploit side-channel information in several attack scenarios when deduplication takes place at the client side, leaking information on whether a specific plaintext exists in the cloud storage. Generalising existing security definitions, we introduce formal security games for a number of possible adversaries in this domain, and show that games representing all natural adversarial behaviors are in fact equivalent. These results allow users and practitioners alike to accurately assess the vulnerability of deployed systems to this real-world concern.


ISC | 2018

Offline Assisted Group Key Exchange

Colin Boyd; Gareth T. Davies; Kristian Gjøsteen; Yao Jiang

We design a group key exchange protocol with forward secrecy where most of the participants remain offline until they wish to compute the key. This is well suited to a cloud storage environment where users are often offline, but have online access to the server which can assist in key exchange. We define and instantiate a new primitive, a blinded KEM, which we show can be used in a natural way as part of our generic protocol construction. Our new protocol has a security proof based on a well-known model for group key exchange. Our protocol is efficient, requiring Diffie–Hellman with a handful of standard public key operations per user in our concrete instantiation.


IACR Cryptology ePrint Archive | 2013

RKA-KDM secure encryption from public-key encryption

Florian Böhl; Gareth T. Davies; Dennis Hofheinz


IACR Cryptology ePrint Archive | 2018

Definitions for Plaintext-Existence Hiding in Cloud Storage.

Colin Boyd; Gareth T. Davies; Kristian Gjøsteen; Håvard Raddum; Mohsen Toorani


IACR Cryptology ePrint Archive | 2018

Offline Assisted Group Key Exchange.

Colin Boyd; Gareth T. Davies; Kristian Gjøsteen; Yao Jiang


IACR Cryptology ePrint Archive | 2018

Zero-Knowledge Proof of Decryption for FHE Ciphertexts.

Christopher Carr; Anamaria Costache; Gareth T. Davies; Kristian Gjøsteen; Martin Strand


IACR Cryptology ePrint Archive | 2017

Security notions for cloud storage and deduplication.

Colin Boyd; Gareth T. Davies; Kristian Gjøsteen; Mohsen Toorani; Håvard Raddum

Collaboration


Dive into the Gareth T. Davies's collaboration.

Top Co-Authors

Avatar

Kristian Gjøsteen

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Colin Boyd

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dennis Hofheinz

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Florian Böhl

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yao Jiang

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Christopher Carr

Norwegian University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge