Distributed public key schemes secure against continual leakage
From MaRDI portal
Publication:2933792
DOI10.1145/2332432.2332462zbMATH Open1301.94103OpenAlexW2066184192WikidataQ130949869 ScholiaQ130949869MaRDI QIDQ2933792FDOQ2933792
Authors: Adi Akavia, Carmit Hazay, Shafi Goldwasser
Publication date: 5 December 2014
Published in: Proceedings of the 2012 ACM symposium on Principles of distributed computing (Search for Journal in Brave)
Full work available at URL: https://hdl.handle.net/1721.1/137546
Recommendations
- Deterministic Public-Key Encryption Under Continual Leakage
- Public-key encryption scheme with optimal continuous leakage resilience
- Distributed Public-Key Cryptography from Weak Secrets
- Public-key cryptosystems resilient to key leakage
- Public-Key Cryptosystems Resilient to Key Leakage
- scientific article; zbMATH DE number 1186864
- Efficient public-key cryptography in the presence of key leakage
- Protecting cryptographic keys against continual leakage
- scientific article; zbMATH DE number 1941251
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
Cited In (11)
- Distributed Public-Key Cryptography from Weak Secrets
- Leakage-Resilient Coin Tossing
- Leakage resilience of the Blom's key distribution scheme
- Deterministic Public-Key Encryption Under Continual Leakage
- Title not available (Why is that?)
- Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks
- Leakage-resilient coin tossing
- Provably secure certificate-based encryption with leakage resilience
- Continuous leakage-resilient identity-based encryption with leakage amplification
- Multi-location leakage resilient cryptography
- Threshold public key encryption scheme resilient against continual leakage without random oracles
This page was built for publication: Distributed public key schemes secure against continual leakage
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2933792)