Cliptography: Clipping the Power of Kleptographic Attacks
From MaRDI portal
Publication:2953772
DOI10.1007/978-3-662-53890-6_2zbMath1380.94121OpenAlexW2406153758MaRDI QIDQ2953772
Qiang Tang, Alexander Russell, Hong-Sheng Zhou, Mordechai M. Yung
Publication date: 6 January 2017
Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53890-6_2
Related Items (22)
UC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted module ⋮ Subversion-resilient enhanced privacy ID ⋮ Homomorphic lower digits removal and improved FHE bootstrapping ⋮ Non-interactive provably secure attestations for arbitrary RSA prime generation algorithms ⋮ Anamorphic encryption: private communication against a dictator ⋮ Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge ⋮ Cliptography: Clipping the Power of Kleptographic Attacks ⋮ NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion ⋮ Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions ⋮ Anamorphic signatures: secrecy from a dictator who only permits authentication! ⋮ Reverse firewalls for adaptively secure MPC without setup ⋮ Crooked indifferentiability of enveloped XOR revisited ⋮ Steganography-free zero-knowledge ⋮ Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks ⋮ Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption ⋮ Cryptographic reverse firewalls for interactive proof systems ⋮ Subliminal Hash Channels ⋮ Immunization against complete subversion without random oracles ⋮ Subversion-resilient signatures: definitions, constructions and applications ⋮ Subversion-resilient public key encryption with practical watchdogs ⋮ Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines ⋮ Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results
Cites Work
- Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines
- Security of Symmetric Encryption against Mass Surveillance
- The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
- A More Cautious Approach to Security Against Mass Surveillance
- A Formal Treatment of Backdoored Pseudorandom Generators
- Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model
- Cryptographic Reverse Firewalls
- Cliptography: Clipping the Power of Kleptographic Attacks
- How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
- The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone?
- Kleptography from Standard Assumptions and Applications
- On the (Im)Possibility of Key Dependent Encryption
- Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Cliptography: Clipping the Power of Kleptographic Attacks