Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
From MaRDI portal
Publication:2958151
DOI10.1007/978-3-662-53887-6_32zbMath1404.94068OpenAlexW2550039900MaRDI QIDQ2958151
Antonio Faonio, Daniele Venturi
Publication date: 1 February 2017
Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/11573/958570
Related Items (12)
Witness Maps and Applications ⋮ The generic construction of continuous leakage-resilient identity-based cryptosystems ⋮ Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience ⋮ Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions ⋮ Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits ⋮ Non-malleable Codes with Split-State Refresh ⋮ Continuously non-malleable codes with split-state refresh ⋮ Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity ⋮ Security of hedged Fiat-Shamir signatures under fault attacks ⋮ Impossibility on tamper-resilient cryptography with uniqueness properties ⋮ Continuous leakage-resilient identity-based encryption with leakage amplification ⋮ Structure-preserving public-key encryption with leakage-resilient CCA security
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Fully leakage-resilient signatures
- A public key cryptosystem based on a subgroup membership problem
- Non-Malleable Functions and Their Applications
- Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Public Key Encryption against Related Key Attacks
- Tamper and Leakage Resilience in the Split-State Model
- Continuous Non-malleable Key Derivation and Its Application to Related-Key Security
- The Chaining Lemma and Its Application
- Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
- After-the-Fact Leakage in Public-Key Encryption
- Correlated-Input Secure Hash Functions
- Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Cryptography Secure against Related-Key Attacks and Tampering
- On Related-Secret Pseudorandomness
- Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation
- Related-Key Security for Hybrid Encryption
- An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security
- Security Against Related Randomness Attacks via Reconstructive Extractors
- Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks
- Private Circuits II: Keeping Secrets in Tamperable Circuits
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Signature Schemes with Bounded Leakage Resilience
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- A Pseudorandom Generator from any One-way Function
- Garbling XOR Gates “For Free” in the Standard Model
- RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures
- Improved Constructions of PRFs Secure Against Related-Key Attacks
- Tamper Detection and Continuous Non-malleable Codes
- Advances in Cryptology – CRYPTO 2004
- Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
- Related Randomness Attacks for Public Key Encryption
- Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits
- Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Fast Software Encryption
- Non-malleable Codes for Bounded Depth, Bounded Fan-In Circuits
- Continuous Non-malleable Codes
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
This page was built for publication: Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience