Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
From MaRDI portal
Publication:2867166
Recommendations
- Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks
- Leakage-resilience of stateless/stateful public-key encryption from hash proofs
- Leakage-resilient public-key encryption from obfuscation
- Public-key encryption scheme with optimal continuous leakage resilience
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Efficient chosen-ciphertext security via extractable hash proofs
- Public-key cryptosystems resilient to key leakage
- Public-Key Cryptosystems Resilient to Key Leakage
- New approach to practical leakage-resilient public-key cryptography
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
Cited in
(26)- Efficient public-key cryptography with bounded leakage and tamper resilience
- New approach to practical leakage-resilient public-key cryptography
- Leakage-resilient IND-CCA KEM from the extractable hash proofs with indistinguishability obfuscation
- Regular lossy functions and their applications in leakage-resilient cryptography
- Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks
- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system
- Tight leakage-resilient CCA-security from quasi-adaptive hash proof system
- Leakage-flexible CCA-secure public-key encryption: simple construction and free of pairing
- Novel generic construction of leakage-resilient PKE scheme with CCA security
- Novel updatable identity-based hash proof system and its applications
- Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
- New leakage-resilient CCA-secure public key encryption
- Leakage-resilient identity-based cryptography from minimal assumptions
- The generic construction of continuous leakage-resilient identity-based cryptosystems
- CCA secure PKE with auxiliary input security and leakage resiliency
- Leakage-resilience of stateless/stateful public-key encryption from hash proofs
- More efficient public-key cryptography with leakage and tamper resilience
- Access control encryption with efficient verifiable sanitized decryption
- Leakage-resilient cryptography from puncturable primitives and obfuscation
- Continuous leakage-resilient identity-based encryption with leakage amplification
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks
- Public key encryption resilient to leakage and tampering attacks
- Structure-preserving public-key encryption with leakage-resilient CCA security
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Non-malleable functions and their applications
This page was built for publication: Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2867166)