Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
From MaRDI portal
Publication:2958152
DOI10.1007/978-3-662-53887-6_33zbMath1404.94071OpenAlexW2552969007MaRDI QIDQ2958152
Eiichiro Fujisaki, Keita Xagawa
Publication date: 1 February 2017
Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53887-6_33
digital signaturepublic-key encryptionbounded or continuous memory leakagecontinuous tampering attacks
Related Items
Witness Maps and Applications, The generic construction of continuous leakage-resilient identity-based cryptosystems, Continuously non-malleable codes with split-state refresh, Security of hedged Fiat-Shamir signatures under fault attacks, Impossibility on tamper-resilient cryptography with uniqueness properties, Continuous leakage-resilient identity-based encryption with leakage amplification, Structure-preserving public-key encryption with leakage-resilient CCA security
Cites Work
- Unnamed Item
- Unnamed Item
- Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23--25, 2015. Proceedings, Part II
- Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- On Continual Leakage of Discrete Log Representations
- Public Key Encryption against Related Key Attacks
- Tamper and Leakage Resilience in the Split-State Model
- Continuous Non-malleable Key Derivation and Its Application to Related-Key Security
- Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions
- Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Cryptography Secure against Related-Key Attacks and Tampering
- Lossy trapdoor functions and their applications
- Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks
- Circular-Secure Encryption from Decision Diffie-Hellman
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- A New Randomness Extraction Paradigm for Hybrid Encryption
- RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures
- Cryptography with Tamperable and Leaky Memory
- Tamper Detection and Continuous Non-malleable Codes
- Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model
- Advances in Cryptology – CRYPTO 2004
- Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
- A new algorithm for optimization
- Continuous Non-malleable Codes
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography