Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model

From MaRDI portal
Revision as of 23:00, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3183555


DOI10.1007/978-3-642-03356-8_3zbMath1252.94041OpenAlexW1588518948MaRDI QIDQ3183555

Daniel Wichs, Yevgeniy Dodis, Joël Alwen

Publication date: 20 October 2009

Published in: Advances in Cryptology - CRYPTO 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-03356-8_3



Related Items

Witness Maps and Applications, Efficient and secure big data storage system with leakage resilience in cloud computing, Signature schemes secure against hard-to-invert leakage, Provable time-memory trade-offs: symmetric cryptography against memory-bounded adversaries, Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation, Targeted lossy functions and applications, Fully Homomorphic Encryption with Auxiliary Inputs, One-Time Programs with Limited Memory, Leakage-resilient cryptography from minimal assumptions, Leakage Resilient One-Way Functions: The Auxiliary-Input Setting, Crypto Galore!, Regular lossy functions and their applications in leakage-resilient cryptography, Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange, Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage, Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience, Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority, Fully leakage-resilient signatures, Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption, Naor-Yung paradigm with shared randomness and applications, ABE with improved auxiliary input for big data security, Incompressible cryptography, Strong authenticated key exchange with auxiliary inputs, Leakage Resilience of the Blom’s Key Distribution Scheme, Threshold public key encryption scheme resilient against continual leakage without random oracles, Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage, Implications of the arithmetic ratio of prime numbers for RSA security, Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications, Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions, Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices, IBE with incompressible master secret and small identity secrets, Rate-1 incompressible encryption from standard assumptions, A modular approach to the incompressibility of block-cipher-based AEADs, Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption, Provably secure certificate-based encryption with leakage resilience, Impossibilities in succinct arguments: black-box extraction and more, A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting, Quasi chain rule for min-entropy, Leakage-resilient cryptography from puncturable primitives and obfuscation, Leakage-resilient ring signature schemes, Hierarchical attribute based encryption with continuous leakage-resilience, Bounded-Retrieval Model with Keys Derived from Private Data, Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation, Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation Authority, Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience, Subversion-resilient signatures: definitions, constructions and applications, Bounded tamper resilience: how to go beyond the algebraic barrier, Leakage-resilient attribute based encryption in prime-order groups via predicate encodings, Leakage-resilient group signature: definitions and constructions, Post-challenge leakage in public-key encryption, Fully Leakage-Resilient Codes, A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes, New approach to practical leakage-resilient public-key cryptography, Leakage resilient one-way functions: the auxiliary-input setting, Continuous leakage-resilient certificate-based encryption, Novel updatable identity-based hash proof system and its applications, Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model, Optimal Amplification of Noisy Leakages, Novel generic construction of leakage-resilient PKE scheme with CCA security, Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model, Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity, Expedient Non-malleability Notions for Hash Functions, Randomness Leakage in the KEM/DEM Framework, Naor-Yung Paradigm with Shared Randomness and Applications, Leakage Resilient Strong Key-Insulated Signatures in Public Channel, Big-Key Symmetric Encryption: Resisting Key Exfiltration, On Symmetric Encryption and Point Obfuscation, Leakage-Resilient Signatures, Public-Key Encryption Schemes with Auxiliary Inputs, Continuous leakage-resilient identity-based encryption with leakage amplification, Strongly leakage resilient authenticated key exchange, revisited, Leakage-resilient key exchange and two-seed extractors, Incompressible encodings


Uses Software