Efficient public-key cryptography with bounded leakage and tamper resilience
From MaRDI portal
Publication:2958151
DOI10.1007/978-3-662-53887-6_32zbMATH Open1404.94068OpenAlexW2550039900MaRDI QIDQ2958151FDOQ2958151
Authors: Antonio Faonio, D. Venturi
Publication date: 1 February 2017
Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/11573/958570
Recommendations
- Public key encryption resilient to leakage and tampering attacks
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Efficient public-key cryptography in the presence of key leakage
- Cryptography with tamperable and leaky memory
- Public key encryption resilient to post-challenge leakage and tampering attacks
Cites Work
- Public Key Encryption against Related Key Attacks
- Efficient public-key cryptography in the presence of key leakage
- Cryptography secure against related-key attacks and tampering
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Title not available (Why is that?)
- A Pseudorandom Generator from any One-way Function
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- RKA security beyond the linear barrier: IBE, encryption and signatures
- Fast Software Encryption
- Signature schemes with bounded leakage resilience
- Advances in Cryptology – CRYPTO 2004
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Public-Key Cryptosystems Resilient to Key Leakage
- Secure Hybrid Encryption from Weakened Key Encapsulation
- After-the-fact leakage in public-key encryption
- Pseudorandom functions and permutations provably secure against related-key attacks
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- A public key cryptosystem based on a subgroup membership problem
- The Chaining Lemma and its application
- Tamper and Leakage Resilience in the Split-State Model
- Continuous non-malleable codes
- Related randomness attacks for public key encryption
- Bounded tamper resilience: how to go beyond the algebraic barrier
- Continuous non-malleable key derivation and its application to related-key security
- Correlated-input secure hash functions
- Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
- Private Circuits II: Keeping Secrets in Tamperable Circuits
- Tamper detection and continuous non-malleable codes
- Efficient non-malleable codes and key-derivation for poly-size tampering circuits
- Theory of Cryptography
- Non-malleable codes for bounded depth, bounded fan-in circuits
- Fully leakage-resilient signatures
- Mind your coins: fully leakage-resilient signatures with graceful degradation
- Security Against Related Randomness Attacks via Reconstructive Extractors
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Leakage-flexible CCA-secure public-key encryption: simple construction and free of pairing
- Non-malleable functions and their applications
- Related-key security for hybrid encryption
- Improved constructions of PRFs secure against related-key attacks
- On related-secret pseudorandomness
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Garbling XOR gates ``for free in the standard model
- An algebraic framework for pseudorandom functions and applications to related-key security
- Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig
Cited In (25)
- Reducing the cost of authenticity with leakages: a CIML2-secure AE scheme with one call to a strongly protected tweakable block cipher
- Cryptography with tamperable and leaky memory
- Security of hedged Fiat-Shamir signatures under fault attacks
- Efficient public-key cryptography with bounded leakage and tamper resilience
- New approach to practical leakage-resilient public-key cryptography
- Efficient public-key cryptography in the presence of key leakage
- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits
- The generic construction of continuous leakage-resilient identity-based cryptosystems
- More efficient public-key cryptography with leakage and tamper resilience
- Leakage-resilient hierarchical identity-based encryption with recipient anonymity
- Witness maps and applications
- Impossibility on tamper-resilient cryptography with uniqueness properties
- Continuously non-malleable codes with split-state refresh
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Public key encryption resilient to post-challenge leakage and tampering attacks
- Continuous leakage-resilient identity-based encryption with leakage amplification
- Efficient fully secure leakage-deterring encryption
- Public key encryption resilient to leakage and tampering attacks
- Structure-preserving public-key encryption with leakage-resilient CCA security
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Bounded tamper resilience: how to go beyond the algebraic barrier
- Bounded tamper resilience: how to go beyond the algebraic barrier
- Non-malleable Codes with Split-State Refresh
- More efficient post-quantum KEMTLS with pre-distributed public keys
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
This page was built for publication: Efficient public-key cryptography with bounded leakage and tamper resilience
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2958151)