On Continual Leakage of Discrete Log Representations
From MaRDI portal
Publication:2867167
DOI10.1007/978-3-642-42045-0_21zbMath1326.94069OpenAlexW98320937MaRDI QIDQ2867167
Shweta Agrawal, Vinod Vaikuntanathan, Daniel Wichs, Yevgeniy Dodis
Publication date: 10 December 2013
Published in: Advances in Cryptology - ASIACRYPT 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-42045-0_21
Related Items (12)
White box traitor tracing ⋮ Updatable all-but-one dual projective hashing and its applications ⋮ Indistinguishable Proofs of Work or Knowledge ⋮ Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage ⋮ Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks ⋮ Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions ⋮ Impossibilities in succinct arguments: black-box extraction and more ⋮ Bounded tamper resilience: how to go beyond the algebraic barrier ⋮ New approach to practical leakage-resilient public-key cryptography ⋮ Continuous leakage-resilient certificate-based encryption ⋮ The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free ⋮ Continuous leakage-resilient identity-based encryption with leakage amplification
This page was built for publication: On Continual Leakage of Discrete Log Representations