After-the-fact leakage in public-key encryption
From MaRDI portal
Publication:3000535
DOI10.1007/978-3-642-19571-6_8zbMATH Open1295.94078OpenAlexW1588165891MaRDI QIDQ3000535FDOQ3000535
Authors: Shai Halevi, Huijia Lin
Publication date: 19 May 2011
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_8
Recommendations
- Post-challenge leakage in public-key encryption
- Public key encryption resilient to post-challenge leakage and tampering attacks
- Efficient compilers for after-the-fact leakage: from CPA to CCA-2 secure PKE to AKE
- Public-Key Cryptosystems Resilient to Key Leakage
- Public-key cryptosystems resilient to key leakage
Cited In (23)
- How to Compute in the Presence of Leakage
- Strong authenticated key exchange with auxiliary inputs
- Strong continuous non-malleable encoding schemes with tamper-detection
- Efficient public-key cryptography with bounded leakage and tamper resilience
- On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives
- Secure computation from leaky correlated randomness
- Big-key symmetric encryption: resisting key exfiltration
- Continuous After-the-Fact Leakage-Resilient Key Exchange
- New approach to practical leakage-resilient public-key cryptography
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model
- Leakage-resilient cryptography from minimal assumptions
- Post-challenge leakage in public-key encryption
- On the connection between leakage tolerance and adaptive security
- Continuously non-malleable codes with split-state refresh
- CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not $$\mathtt {q}$$ -type) Assumptions
- Efficient compilers for after-the-fact leakage: from CPA to CCA-2 secure PKE to AKE
- On the leakage-resilient key exchange
- Leakage-resilient cryptography from puncturable primitives and obfuscation
- Fully Leakage-Resilient Codes
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks
- Post-Compromise Security in Self-Encryption
- Strongly leakage resilient authenticated key exchange, revisited
- Randomness leakage in the KEM/DEM framework
This page was built for publication: After-the-fact leakage in public-key encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3000535)