Efficient public-key cryptography in the presence of key leakage
From MaRDI portal
Publication:3058682
DOI10.1007/978-3-642-17373-8_35zbMATH Open1290.94064OpenAlexW1500578148MaRDI QIDQ3058682FDOQ3058682
Authors: Yevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt, Daniel Wichs
Publication date: 7 December 2010
Published in: Advances in Cryptology - ASIACRYPT 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-17373-8_35
Recommendations
- Public-Key Cryptosystems Resilient to Key Leakage
- Public-key cryptosystems resilient to key leakage
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Signature schemes secure against hard-to-invert leakage
Cited In (97)
- Continuously non-malleable codes in the split-state model
- Distributed public key schemes secure against continual leakage
- An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism
- A unified framework for non-universal SNARKs
- Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing
- How to Compute in the Presence of Leakage
- Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing
- Leakage-resilient group signature: definitions and constructions
- Signatures Resilient to Uninvertible Leakage
- NIZKs with an untrusted CRS: security in the face of parameter subversion
- Strong authenticated key exchange with auxiliary inputs
- Deterministic Public-Key Encryption Under Continual Leakage
- Signature schemes secure against hard-to-invert leakage
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Leakage-resilient functional encryption via pair encodings
- On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives
- Tightly secure signatures and public-key encryption
- New approach to practical leakage-resilient public-key cryptography
- Continuously non-malleable secret sharing for general access structures
- Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model
- Regular lossy functions and their applications in leakage-resilient cryptography
- Public-Key Cryptosystems Resilient to Key Leakage
- Towards a ring analogue of the leftover hash lemma
- Leakage-resilient cryptography from minimal assumptions
- Issuer-hiding attribute-based credentials
- Novel generic construction of leakage-resilient PKE scheme with CCA security
- Anonymous and leakage resilient IBE and IPE
- Leakage resilient one-way functions: the auxiliary-input setting
- Novel updatable identity-based hash proof system and its applications
- Spooky Encryption and Its Applications
- Leakage-resilient identity-based cryptography from minimal assumptions
- On the connection between leakage tolerance and adaptive security
- Mind your coins: fully leakage-resilient signatures with graceful degradation
- The generic construction of continuous leakage-resilient identity-based cryptosystems
- Tagged one-time signatures: tight security and optimal tag size
- The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free
- Updatable public key encryption in the standard model
- Witness maps and applications
- Fully leakage-resilient non-malleable identification schemes in the bounded-retrieval model
- Leakage-resilient coin tossing
- Impossibility on tamper-resilient cryptography with uniqueness properties
- Continuously non-malleable codes with split-state refresh
- Generalizing efficient multiparty computation
- (In)security of ring-LWE under partial key exposure
- Leakage-resilient cryptography from puncturable primitives and obfuscation
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- On the impossibility of cryptography with tamperable randomness
- Leakage-resilient cryptography from the inner-product extractor
- Fully leakage-resilient signatures
- Efficient fully secure leakage-deterring encryption
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge
- Structure-preserving public-key encryption with leakage-resilient CCA security
- Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes
- Optimal amplification of noisy leakages
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Strongly leakage resilient authenticated key exchange, revisited
- Generic transformation to strongly existentially unforgeable signature schemes with continuous leakage resiliency
- A practical leakage-resilient signature scheme in the generic group model
- Leakage-resilient ring signature schemes
- An algebraic framework for Diffie-Hellman assumptions
- Bounded tamper resilience: how to go beyond the algebraic barrier
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions
- Leakage resilient ElGamal encryption
- Continuous after-the-fact leakage-resilient eCK-secure key exchange
- Public-key encryption scheme with optimal continuous leakage resilience
- More efficient post-quantum KEMTLS with pre-distributed public keys
- Leakage resilience from program obfuscation
- Title not available (Why is that?)
- Leakage resilience of the Blom's key distribution scheme
- Leakage-resilient cryptography over large finite fields: theory and practice
- From polynomial IOP and commitments to non-malleable zkSNARKs
- Title not available (Why is that?)
- Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds)
- Bringing order to chaos: the case of collision-resistant chameleon-hashes
- Fully homomorphic encryption with auxiliary inputs
- Nonmalleable digital lockers and robust fuzzy extractors in the plain model
- Lockable obfuscation from circularly insecure fully homomorphic encryption
- Efficient updatable public-key encryption from lattices
- What makes Fiat-Shamir zkSNARKs (updatable SRS) simulation extractable?
- Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption
- Post-challenge leakage in public-key encryption
- A map of witness maps: new definitions and connections
- Simulation-extractable KZG polynomial commitments and applications to HyperPlonk
- More efficient public-key cryptography with leakage and tamper resilience
- Updatable all-but-one dual projective hashing and its applications
- Continuous leakage-resilient identity-based encryption with leakage amplification
- Naor-Yung paradigm with shared randomness and applications
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks
- Public key encryption resilient to leakage and tampering attacks
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
- NIZK from SNARGs
- Naor-Yung Paradigm with Shared Randomness and Applications
- Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy
- Upgrading fuzzy extractors
This page was built for publication: Efficient public-key cryptography in the presence of key leakage
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3058682)