Efficient Public-Key Cryptography in the Presence of Key Leakage

From MaRDI portal
Publication:3058682

DOI10.1007/978-3-642-17373-8_35zbMath1290.94064OpenAlexW1500578148MaRDI QIDQ3058682

Adriana López-Alt, Kristiyan Haralambiev, Yevgeniy Dodis, Daniel Wichs

Publication date: 7 December 2010

Published in: Advances in Cryptology - ASIACRYPT 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-17373-8_35




Related Items (79)

Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairingWitness Maps and ApplicationsBringing Order to Chaos: The Case of Collision-Resistant Chameleon-HashesSignature schemes secure against hard-to-invert leakageMind Your Coins: Fully Leakage-Resilient Signatures with Graceful DegradationHow to Compute in the Presence of LeakageTightly secure signatures and public-key encryptionThe generic construction of continuous leakage-resilient identity-based cryptosystemsFully Homomorphic Encryption with Auxiliary InputsA Practical Leakage-Resilient Signature Scheme in the Generic Group ModelLeakage-resilient cryptography from minimal assumptionsLeakage Resilient One-Way Functions: The Auxiliary-Input SettingRegular lossy functions and their applications in leakage-resilient cryptographyContinuous After-the-Fact Leakage-Resilient eCK-Secure Key ExchangeIssuer-hiding attribute-based credentialsFully leakage-resilient signaturesGeneric Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage ResiliencyNaor-Yung paradigm with shared randomness and applicationsPublic key encryption resilient to leakage and tampering attacksStrong authenticated key exchange with auxiliary inputsPublic-key encryption for protecting data in cloud system with intelligent agents against side-channel attacksA Unified Framework for Non-universal SNARKsAnonymous and leakage resilient IBE and IPEContinuously non-malleable secret sharing for general access structuresGeneralizing Efficient Multiparty ComputationUpdatable all-but-one dual projective hashing and its applicationsLeakage Resilience of the Blom’s Key Distribution SchemeKey-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledgeLeakage-resilient identity-based cryptography from minimal assumptionsA map of witness maps: new definitions and connectionsOn the impossibility of cryptography with tamperable randomnessNIZKs with an Untrusted CRS: Security in the Face of Parameter SubversionPublic-key encryption scheme with optimal continuous leakage resilienceStrongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard AssumptionsNIZK from SNARGsLeakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from latticesEfficient Public-Key Cryptography with Bounded Leakage and Tamper ResiliencePublic-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary FunctionsWhat makes Fiat-Shamir zkSNARKs (updatable SRS) simulation extractable?Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds)Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear AssumptionLockable obfuscation from circularly insecure fully homomorphic encryptionNonmalleable digital lockers and robust fuzzy extractors in the plain modelComputational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropyUpdatable public key encryption in the standard modelLeakage-resilient cryptography from puncturable primitives and obfuscationContinuously non-malleable codes in the split-state modelLeakage-resilient ring signature schemesBounded tamper resilience: how to go beyond the algebraic barrierAn algebraic framework for Diffie-Hellman assumptionsTagged One-Time Signatures: Tight Security and Optimal Tag SizeOn the Connection between Leakage Tolerance and Adaptive SecurityLeakage-resilient coin tossingContinuous leakage-resilient certificate-based signcryption scheme and application in cloud computingLeakage-resilient group signature: definitions and constructionsPost-challenge leakage in public-key encryptionStructure-Preserving Chosen-Ciphertext Security with Shorter Verifiable CiphertextsNew approach to practical leakage-resilient public-key cryptographyContinuously non-malleable codes with split-state refresh(In)security of ring-LWE under partial key exposureTowards a ring analogue of the leftover hash lemmaLeakage resilient one-way functions: the auxiliary-input settingLeakage-Resilient Cryptography over Large Finite Fields: Theory and PracticeOn hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitivesNovel updatable identity-based hash proof system and its applicationsFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelOptimal Amplification of Noisy LeakagesNovel generic construction of leakage-resilient PKE scheme with CCA securityLeakage-Resilient Functional Encryption via Pair EncodingsThe mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for freeDeterministic Public-Key Encryption Under Continual LeakageImpossibility on tamper-resilient cryptography with uniqueness propertiesNaor-Yung Paradigm with Shared Randomness and ApplicationsSignatures Resilient to Uninvertible LeakageSpooky Encryption and Its ApplicationsLeakage resilience from program obfuscationContinuous leakage-resilient identity-based encryption with leakage amplificationStructure-preserving public-key encryption with leakage-resilient CCA securityStrongly leakage resilient authenticated key exchange, revisited




This page was built for publication: Efficient Public-Key Cryptography in the Presence of Key Leakage