Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
From MaRDI portal
Publication:2958152
DOI10.1007/978-3-662-53887-6_33zbMATH Open1404.94071OpenAlexW2552969007MaRDI QIDQ2958152FDOQ2958152
Authors: Eiichiro Fujisaki, Keita Xagawa
Publication date: 1 February 2017
Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53887-6_33
Recommendations
- Public-key cryptosystems resilient to key leakage
- Public-Key Cryptosystems Resilient to Key Leakage
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Public-key encryption scheme with optimal continuous leakage resilience
- Public key encryption resilient to leakage and tampering attacks
- Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks
- Public key encryption resilient to post-challenge leakage and tampering attacks
- New approach to practical leakage-resilient public-key cryptography
- Deterministic Public-Key Encryption Under Continual Leakage
- Efficient public-key cryptography in the presence of key leakage
public-key encryptiondigital signaturebounded or continuous memory leakagecontinuous tampering attacks
Cites Work
- Public Key Encryption against Related Key Attacks
- Efficient public-key cryptography in the presence of key leakage
- Cryptography secure against related-key attacks and tampering
- Title not available (Why is that?)
- Title not available (Why is that?)
- RKA security beyond the linear barrier: IBE, encryption and signatures
- Circular-Secure Encryption from Decision Diffie-Hellman
- Advances in Cryptology – CRYPTO 2004
- Public-Key Cryptosystems Resilient to Key Leakage
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Pseudorandom functions and permutations provably secure against related-key attacks
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Lossy trapdoor functions and their applications
- A new algorithm for optimization
- Tamper and Leakage Resilience in the Split-State Model
- Continuous non-malleable codes
- Bounded tamper resilience: how to go beyond the algebraic barrier
- On continual leakage of discrete log representations
- Continuous non-malleable key derivation and its application to related-key security
- A New Randomness Extraction Paradigm for Hybrid Encryption
- Cryptography with tamperable and leaky memory
- Tamper detection and continuous non-malleable codes
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
- Theory of Cryptography
- Optimal algebraic manipulation detection codes in the constant-error model
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Leakage-flexible CCA-secure public-key encryption: simple construction and free of pairing
- Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23--25, 2015. Proceedings, Part II
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions
Cited In (16)
- Distributed public key schemes secure against continual leakage
- Cryptography with tamperable and leaky memory
- Security of hedged Fiat-Shamir signatures under fault attacks
- Deterministic Public-Key Encryption Under Continual Leakage
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Cryptographically resilient functions
- The generic construction of continuous leakage-resilient identity-based cryptosystems
- More efficient public-key cryptography with leakage and tamper resilience
- Witness maps and applications
- Impossibility on tamper-resilient cryptography with uniqueness properties
- Continuously non-malleable codes with split-state refresh
- Public key encryption resilient to post-challenge leakage and tampering attacks
- Continuous leakage-resilient identity-based encryption with leakage amplification
- Public key encryption resilient to leakage and tampering attacks
- Structure-preserving public-key encryption with leakage-resilient CCA security
- Bounded tamper resilience: how to go beyond the algebraic barrier
This page was built for publication: Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2958152)