Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier
From MaRDI portal
Publication:2867150
DOI10.1007/978-3-642-42045-0_8zbMath1314.94065OpenAlexW2165192120MaRDI QIDQ2867150
Sebastian Faust, Daniele Venturi, Pratyay Mukherjee, Ivan B. Damgård
Publication date: 10 December 2013
Published in: Advances in Cryptology - ASIACRYPT 2013 (Search for Journal in Brave)
Full work available at URL: https://link.springer.com/article/10.1007/s00145-015-9218-0
Related Items
Witness Maps and Applications ⋮ Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system ⋮ Public key encryption resilient to leakage and tampering attacks ⋮ Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks ⋮ Anonymous and leakage resilient IBE and IPE ⋮ The Chaining Lemma and Its Application ⋮ NIZK from SNARGs ⋮ Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience ⋮ Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions ⋮ Practical non-malleable codes from symmetric-key primitives in 2-split-state model ⋮ Continuously non-malleable codes in the split-state model ⋮ Subversion-resilient signatures: definitions, constructions and applications ⋮ Bounded tamper resilience: how to go beyond the algebraic barrier ⋮ Non-malleable Codes with Split-State Refresh ⋮ Continuously non-malleable codes with split-state refresh ⋮ Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model ⋮ Locally decodable and updatable non-malleable codes and their applications