Signatures Resilient to Continual Leakage on Memory and Computation
From MaRDI portal
Publication:3000534
DOI10.1007/978-3-642-19571-6_7zbMath1295.94185OpenAlexW1524293366MaRDI QIDQ3000534
Isamu Teranishi, Yevgeniy Vahlis, Tal Malkin, Mordechai M. Yung
Publication date: 19 May 2011
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_7
Related Items (36)
Short Attribute-Based Signatures for Threshold Predicates ⋮ Witness Maps and Applications ⋮ On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation Soundness ⋮ Signature schemes secure against hard-to-invert leakage ⋮ Memory leakage-resilient secret sharing schemes ⋮ Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation ⋮ Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares ⋮ A Practical Leakage-Resilient Signature Scheme in the Generic Group Model ⋮ Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting ⋮ Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange ⋮ Fully leakage-resilient signatures ⋮ Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency ⋮ Linearly homomorphic structure-preserving signatures and their applications ⋮ On the leakage-resilient key exchange ⋮ A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model ⋮ Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions ⋮ DAG-\( \Sigma \): a DAG-based sigma protocol for relations in CNF ⋮ Provably secure certificate-based encryption with leakage resilience ⋮ Non-interactive composition of sigma-protocols via Share-then-Hash ⋮ A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting ⋮ Leakage-resilient cryptography from puncturable primitives and obfuscation ⋮ Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions ⋮ Leakage-resilient ring signature schemes ⋮ Predictable Arguments of Knowledge ⋮ Fully Leakage-Resilient Codes ⋮ New approach to practical leakage-resilient public-key cryptography ⋮ (In)security of ring-LWE under partial key exposure ⋮ Towards a ring analogue of the leftover hash lemma ⋮ Continuous leakage-resilient certificate-based encryption ⋮ On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives ⋮ Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model ⋮ Leakage-Resilient Functional Encryption via Pair Encodings ⋮ Signatures Resilient to Uninvertible Leakage ⋮ Leakage resilience from program obfuscation ⋮ Black-box constructions of signature schemes in the bounded leakage setting ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
This page was built for publication: Signatures Resilient to Continual Leakage on Memory and Computation