Signatures resilient to continual leakage on memory and computation
From MaRDI portal
Publication:3000534
DOI10.1007/978-3-642-19571-6_7zbMATH Open1295.94185OpenAlexW1524293366MaRDI QIDQ3000534FDOQ3000534
Authors: Tal Malkin, Isamu Teranishi, Yevgeniy Vahlis, Moti Yung
Publication date: 19 May 2011
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_7
Recommendations
Cited In (41)
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions
- Leakage resilience from program obfuscation
- Continuous leakage-resilient certificate-based encryption
- Forward-security under continual leakage
- A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model
- Cryptography with tamperable and leaky memory
- Signatures Resilient to Uninvertible Leakage
- Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency
- Witness Maps and Applications
- A Practical Leakage-Resilient Signature Scheme in the Generic Group Model
- Signature schemes secure against hard-to-invert leakage
- Leakage-Resilient Signatures with Graceful Degradation
- Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange
- On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives
- Predictable Arguments of Knowledge
- ARMed SPHINCS
- New approach to practical leakage-resilient public-key cryptography
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares
- Towards a ring analogue of the leftover hash lemma
- Linearly homomorphic structure-preserving signatures and their applications
- On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation Soundness
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
- Leakage-Resilient Functional Encryption via Pair Encodings
- Signature schemes with bounded leakage resilience
- A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting
- Non-interactive composition of sigma-protocols via Share-then-Hash
- Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting
- Short Attribute-Based Signatures for Threshold Predicates
- Black-box constructions of signature schemes in the bounded leakage setting
- Provably secure certificate-based encryption with leakage resilience
- Memory leakage-resilient secret sharing schemes
- On the leakage-resilient key exchange
- (In)security of ring-LWE under partial key exposure
- Leakage-resilient cryptography from puncturable primitives and obfuscation
- Fully Leakage-Resilient Codes
- Fully leakage-resilient signatures
- Leakage-resilient ring signature schemes
- Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions
- Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation
- DAG-\( \Sigma \): a DAG-based sigma protocol for relations in CNF
This page was built for publication: Signatures resilient to continual leakage on memory and computation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3000534)