Public-Key Cryptosystems Resilient to Key Leakage

From MaRDI portal
Revision as of 23:00, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5895111


DOI10.1007/978-3-642-03356-8_2zbMath1252.94091OpenAlexW1547517307MaRDI QIDQ5895111

Moni Naor, Gil Segev

Publication date: 20 October 2009

Published in: Advances in Cryptology - CRYPTO 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-03356-8_2



Related Items

Witness Maps and Applications, Efficient and secure big data storage system with leakage resilience in cloud computing, Signature schemes secure against hard-to-invert leakage, Memory leakage-resilient secret sharing schemes, Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation, How to Compute in the Presence of Leakage, Targeted lossy functions and applications, The generic construction of continuous leakage-resilient identity-based cryptosystems, Fully Homomorphic Encryption with Auxiliary Inputs, Leakage-resilient cryptography from minimal assumptions, Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts, Regular lossy functions and their applications in leakage-resilient cryptography, Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage, Another step towards realizing random oracles: non-malleable point obfuscation, Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority, Fully leakage-resilient signatures, Naor-Yung paradigm with shared randomness and applications, Public key encryption resilient to leakage and tampering attacks, Strong authenticated key exchange with auxiliary inputs, Anonymous and leakage resilient IBE and IPE, Leakage Resilience of the Blom’s Key Distribution Scheme, On the leakage-resilient key exchange, Leakage-resilient identity-based cryptography from minimal assumptions, Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage, Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks, Almost tight multi-user security under adaptive corruptions \& leakages in the standard model, Public-key encryption scheme with optimal continuous leakage resilience, Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions, Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices, SCALES. MPC with small clients and larger ephemeral servers, The Kernel Matrix Diffie-Hellman Assumption, Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience, Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions, Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption, Lockable obfuscation from circularly insecure fully homomorphic encryption, Practical non-malleable codes from symmetric-key primitives in 2-split-state model, Group homomorphic encryption: characterizations, impossibility results, and applications, Provably secure certificate-based encryption with leakage resilience, More constructions of lossy and correlation-secure trapdoor functions, Circular security is complete for KDM security, Updatable public key encryption in the standard model, Leakage-resilient cryptography from puncturable primitives and obfuscation, Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation, Unifying leakage models: from probing attacks to noisy leakage, Lossy Key Encapsulation Mechanism and Its Applications, Non-Malleable Codes from Additive Combinatorics, Generic Fully Simulatable Adaptive Oblivious Transfer, Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience, Bounded tamper resilience: how to go beyond the algebraic barrier, An algebraic framework for Diffie-Hellman assumptions, Leakage-resilient attribute based encryption in prime-order groups via predicate encodings, On the Connection between Leakage Tolerance and Adaptive Security, Leakage-resilient coin tossing, Post-challenge leakage in public-key encryption, Non-malleable Codes with Split-State Refresh, Fully Leakage-Resilient Codes, New approach to practical leakage-resilient public-key cryptography, Continuously non-malleable codes with split-state refresh, Continuous leakage-resilient certificate-based encryption, Novel updatable identity-based hash proof system and its applications, Verifiable Random Functions from Standard Assumptions, Multilinear Maps from Obfuscation, Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model, Optimal Amplification of Noisy Leakages, Novel generic construction of leakage-resilient PKE scheme with CCA security, Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model, Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity, Identity-based encryption with leakage-amplified chosen-ciphertext attacks security, CCA security and trapdoor functions via key-dependent-message security, Better security for deterministic public-key encryption: the auxiliary-input setting, Leakage-resilient biometric-based remote user authentication with fuzzy extractors, Deterministic Public-Key Encryption Under Continual Leakage, Randomness Leakage in the KEM/DEM Framework, Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks, Leakage-Resilient Coin Tossing, Naor-Yung Paradigm with Shared Randomness and Applications, Signatures Resilient to Uninvertible Leakage, Leakage resilience from program obfuscation, The magic of ELFs, On Constructing Homomorphic Encryption Schemes from Coding Theory, On Symmetric Encryption and Point Obfuscation, Leakage-Resilient Signatures, Public-Key Encryption Schemes with Auxiliary Inputs, Public-Key Cryptographic Primitives Provably as Secure as Subset Sum, Continuous leakage-resilient identity-based encryption with leakage amplification, Structure-preserving public-key encryption with leakage-resilient CCA security, Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle, Leakage-resilient key exchange and two-seed extractors, Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family