Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
From MaRDI portal
Publication:2867166
DOI10.1007/978-3-642-42045-0_20zbMATH Open1326.94117OpenAlexW2165342398MaRDI QIDQ2867166FDOQ2867166
Publication date: 10 December 2013
Published in: Advances in Cryptology - ASIACRYPT 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-42045-0_20
Cited In (19)
- New approach to practical leakage-resilient public-key cryptography
- Regular lossy functions and their applications in leakage-resilient cryptography
- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system
- Novel generic construction of leakage-resilient PKE scheme with CCA security
- Novel updatable identity-based hash proof system and its applications
- Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
- Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
- Leakage-resilient identity-based cryptography from minimal assumptions
- Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation
- The generic construction of continuous leakage-resilient identity-based cryptosystems
- More efficient public-key cryptography with leakage and tamper resilience
- Access control encryption with efficient verifiable sanitized decryption
- Leakage-resilient cryptography from puncturable primitives and obfuscation
- Continuous leakage-resilient identity-based encryption with leakage amplification
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks
- Public key encryption resilient to leakage and tampering attacks
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Non-malleable functions and their applications
Recommendations
- Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks π π
- Leakage-resilience of stateless/stateful public-key encryption from hash proofs π π
- Leakage-resilient public-key encryption from obfuscation π π
- Public-key encryption scheme with optimal continuous leakage resilience π π
- Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience π π
- Efficient chosen-ciphertext security via extractable hash proofs π π
- Public-key cryptosystems resilient to key leakage π π
- Public-Key Cryptosystems Resilient to Key Leakage π π
- New approach to practical leakage-resilient public-key cryptography π π
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model π π
This page was built for publication: Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2867166)