Cliptography: Clipping the Power of Kleptographic Attacks

From MaRDI portal
Publication:2953772

DOI10.1007/978-3-662-53890-6_2zbMath1380.94121OpenAlexW2406153758MaRDI QIDQ2953772

Qiang Tang, Alexander Russell, Hong-Sheng Zhou, Mordechai M. Yung

Publication date: 6 January 2017

Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-53890-6_2




Related Items (22)

UC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted moduleSubversion-resilient enhanced privacy IDHomomorphic lower digits removal and improved FHE bootstrappingNon-interactive provably secure attestations for arbitrary RSA prime generation algorithmsAnamorphic encryption: private communication against a dictatorVerifiably-Extractable OWFs and Their Applications to Subversion Zero-KnowledgeCliptography: Clipping the Power of Kleptographic AttacksNIZKs with an Untrusted CRS: Security in the Face of Parameter SubversionCryptographic Reverse Firewall via Malleable Smooth Projective Hash FunctionsAnamorphic signatures: secrecy from a dictator who only permits authentication!Reverse firewalls for adaptively secure MPC without setupCrooked indifferentiability of enveloped XOR revisitedSteganography-free zero-knowledgeBackdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networksSubvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryptionCryptographic reverse firewalls for interactive proof systemsSubliminal Hash ChannelsImmunization against complete subversion without random oraclesSubversion-resilient signatures: definitions, constructions and applicationsSubversion-resilient public key encryption with practical watchdogsMessage Transmission with Reverse Firewalls—Secure Communication on Corrupted MachinesBackdoors in Pseudorandom Number Generators: Possibility and Impossibility Results




Cites Work




This page was built for publication: Cliptography: Clipping the Power of Kleptographic Attacks