Efficient public-key cryptography with bounded leakage and tamper resilience
From MaRDI portal
Publication:2958151
DOI10.1007/978-3-662-53887-6_32zbMATH Open1404.94068OpenAlexW2550039900MaRDI QIDQ2958151FDOQ2958151
Publication date: 1 February 2017
Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/11573/958570
Recommendations
- Public key encryption resilient to leakage and tampering attacks
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Efficient public-key cryptography in the presence of key leakage
- Cryptography with tamperable and leaky memory
- Public key encryption resilient to post-challenge leakage and tampering attacks
Cites Work
- Public Key Encryption against Related Key Attacks
- Efficient public-key cryptography in the presence of key leakage
- Cryptography Secure against Related-Key Attacks and Tampering
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Title not available (Why is that?)
- A Pseudorandom Generator from any One-way Function
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures
- Fast Software Encryption
- Signature schemes with bounded leakage resilience
- Advances in Cryptology – CRYPTO 2004
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Public-Key Cryptosystems Resilient to Key Leakage
- Secure Hybrid Encryption from Weakened Key Encapsulation
- After-the-Fact Leakage in Public-Key Encryption
- Pseudorandom functions and permutations provably secure against related-key attacks
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- A public key cryptosystem based on a subgroup membership problem
- The Chaining Lemma and Its Application
- Tamper and Leakage Resilience in the Split-State Model
- Continuous Non-malleable Codes
- Related Randomness Attacks for Public Key Encryption
- Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier
- Continuous Non-malleable Key Derivation and Its Application to Related-Key Security
- Correlated-Input Secure Hash Functions
- Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
- Private Circuits II: Keeping Secrets in Tamperable Circuits
- Tamper Detection and Continuous Non-malleable Codes
- Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits
- Theory of Cryptography
- Non-malleable Codes for Bounded Depth, Bounded Fan-In Circuits
- Fully leakage-resilient signatures
- Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation
- Security Against Related Randomness Attacks via Reconstructive Extractors
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
- Non-Malleable Functions and Their Applications
- Related-Key Security for Hybrid Encryption
- Improved Constructions of PRFs Secure Against Related-Key Attacks
- On related-secret pseudorandomness
- Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
- Garbling XOR Gates “For Free” in the Standard Model
- An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security
- Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig
Cited In (21)
- Reducing the cost of authenticity with leakages: a CIML2-secure AE scheme with one call to a strongly protected tweakable block cipher
- Witness Maps and Applications
- Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity
- Security of hedged Fiat-Shamir signatures under fault attacks
- New approach to practical leakage-resilient public-key cryptography
- Efficient public-key cryptography in the presence of key leakage
- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits
- Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
- The generic construction of continuous leakage-resilient identity-based cryptosystems
- More efficient public-key cryptography with leakage and tamper resilience
- Impossibility on tamper-resilient cryptography with uniqueness properties
- Continuously non-malleable codes with split-state refresh
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Public key encryption resilient to post-challenge leakage and tampering attacks
- Continuous leakage-resilient identity-based encryption with leakage amplification
- Efficient fully secure leakage-deterring encryption
- Structure-preserving public-key encryption with leakage-resilient CCA security
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Non-malleable Codes with Split-State Refresh
- More efficient post-quantum KEMTLS with pre-distributed public keys
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
This page was built for publication: Efficient public-key cryptography with bounded leakage and tamper resilience
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2958151)