Signatures Resilient to Continual Leakage on Memory and Computation

From MaRDI portal
Publication:3000534

DOI10.1007/978-3-642-19571-6_7zbMath1295.94185OpenAlexW1524293366MaRDI QIDQ3000534

Isamu Teranishi, Yevgeniy Vahlis, Tal Malkin, Mordechai M. Yung

Publication date: 19 May 2011

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_7




Related Items (36)

Short Attribute-Based Signatures for Threshold PredicatesWitness Maps and ApplicationsOn Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation SoundnessSignature schemes secure against hard-to-invert leakageMemory leakage-resilient secret sharing schemesMind Your Coins: Fully Leakage-Resilient Signatures with Graceful DegradationBorn and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short sharesA Practical Leakage-Resilient Signature Scheme in the Generic Group ModelImplicit Zero-Knowledge Arguments and Applications to the Malicious SettingContinuous After-the-Fact Leakage-Resilient eCK-Secure Key ExchangeFully leakage-resilient signaturesGeneric Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage ResiliencyLinearly homomorphic structure-preserving signatures and their applicationsOn the leakage-resilient key exchangeA Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage ModelStrongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard AssumptionsDAG-\( \Sigma \): a DAG-based sigma protocol for relations in CNFProvably secure certificate-based encryption with leakage resilienceNon-interactive composition of sigma-protocols via Share-then-HashA Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage SettingLeakage-resilient cryptography from puncturable primitives and obfuscationAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsLeakage-resilient ring signature schemesPredictable Arguments of KnowledgeFully Leakage-Resilient CodesNew approach to practical leakage-resilient public-key cryptography(In)security of ring-LWE under partial key exposureTowards a ring analogue of the leftover hash lemmaContinuous leakage-resilient certificate-based encryptionOn hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitivesFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelLeakage-Resilient Functional Encryption via Pair EncodingsSignatures Resilient to Uninvertible LeakageLeakage resilience from program obfuscationBlack-box constructions of signature schemes in the bounded leakage settingMode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle




This page was built for publication: Signatures Resilient to Continual Leakage on Memory and Computation