Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage
From MaRDI portal
Publication:3460114
DOI10.1007/978-3-319-27239-9_19zbMath1338.94061OpenAlexW2401992712MaRDI QIDQ3460114
Giuseppe Ateniese, Seny Kamara, Antonio Faonio
Publication date: 12 January 2016
Published in: Cryptography and Coding (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-27239-9_19
leakage resiliencebounded retrieval modelgeneric transformationidentification schemeproof of storageRSA security
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Zero-knowledge proofs of identity
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
- Compact Proofs of Retrievability
- Proofs of Retrievability via Hardness Amplification
- Proofs of Storage from Homomorphic Identification Protocols
- Signature Schemes with Bounded Leakage Resilience
- Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
- Shielding circuits with groups
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
- Theory of Cryptography
- Theory of Cryptography
This page was built for publication: Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage