Efficient public-key cryptography in the presence of key leakage
From MaRDI portal
Publication:3058682
Recommendations
- Public-Key Cryptosystems Resilient to Key Leakage
- Public-key cryptosystems resilient to key leakage
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Signature schemes secure against hard-to-invert leakage
Cited in
(97)- Continuously non-malleable codes in the split-state model
- Leakage resilience from program obfuscation
- Distributed public key schemes secure against continual leakage
- Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing
- An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism
- A unified framework for non-universal SNARKs
- scientific article; zbMATH DE number 5056807 (Why is no real title available?)
- Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing
- Leakage-resilient group signature: definitions and constructions
- How to Compute in the Presence of Leakage
- Leakage resilience of the Blom's key distribution scheme
- Leakage-resilient cryptography over large finite fields: theory and practice
- Signatures Resilient to Uninvertible Leakage
- From polynomial IOP and commitments to non-malleable zkSNARKs
- scientific article; zbMATH DE number 7121810 (Why is no real title available?)
- NIZKs with an untrusted CRS: security in the face of parameter subversion
- Strong authenticated key exchange with auxiliary inputs
- Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds)
- Signature schemes secure against hard-to-invert leakage
- Deterministic Public-Key Encryption Under Continual Leakage
- On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Tightly secure signatures and public-key encryption
- Leakage-resilient functional encryption via pair encodings
- Fully homomorphic encryption with auxiliary inputs
- New approach to practical leakage-resilient public-key cryptography
- Bringing order to chaos: the case of collision-resistant chameleon-hashes
- Nonmalleable digital lockers and robust fuzzy extractors in the plain model
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model
- Continuously non-malleable secret sharing for general access structures
- Lockable obfuscation from circularly insecure fully homomorphic encryption
- Regular lossy functions and their applications in leakage-resilient cryptography
- Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts
- Efficient updatable public-key encryption from lattices
- Towards a ring analogue of the leftover hash lemma
- Public-Key Cryptosystems Resilient to Key Leakage
- Leakage-resilient cryptography from minimal assumptions
- What makes Fiat-Shamir zkSNARKs (updatable SRS) simulation extractable?
- Issuer-hiding attribute-based credentials
- Post-challenge leakage in public-key encryption
- Novel generic construction of leakage-resilient PKE scheme with CCA security
- Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption
- Anonymous and leakage resilient IBE and IPE
- A map of witness maps: new definitions and connections
- Leakage resilient one-way functions: the auxiliary-input setting
- Novel updatable identity-based hash proof system and its applications
- Spooky Encryption and Its Applications
- Leakage-resilient identity-based cryptography from minimal assumptions
- Simulation-extractable KZG polynomial commitments and applications to HyperPlonk
- The generic construction of continuous leakage-resilient identity-based cryptosystems
- On the connection between leakage tolerance and adaptive security
- Mind your coins: fully leakage-resilient signatures with graceful degradation
- The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free
- Tagged one-time signatures: tight security and optimal tag size
- Updatable public key encryption in the standard model
- More efficient public-key cryptography with leakage and tamper resilience
- Witness maps and applications
- Fully leakage-resilient non-malleable identification schemes in the bounded-retrieval model
- Updatable all-but-one dual projective hashing and its applications
- Impossibility on tamper-resilient cryptography with uniqueness properties
- Leakage-resilient coin tossing
- Continuously non-malleable codes with split-state refresh
- Leakage-resilient cryptography from puncturable primitives and obfuscation
- (In)security of ring-LWE under partial key exposure
- Generalizing efficient multiparty computation
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- Continuous leakage-resilient identity-based encryption with leakage amplification
- On the impossibility of cryptography with tamperable randomness
- Naor-Yung paradigm with shared randomness and applications
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks
- Fully leakage-resilient signatures
- Leakage-resilient cryptography from the inner-product extractor
- Efficient fully secure leakage-deterring encryption
- Public key encryption resilient to leakage and tampering attacks
- Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Structure-preserving public-key encryption with leakage-resilient CCA security
- Optimal amplification of noisy leakages
- Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Naor-Yung Paradigm with Shared Randomness and Applications
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
- NIZK from SNARGs
- Strongly leakage resilient authenticated key exchange, revisited
- Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy
- Generic transformation to strongly existentially unforgeable signature schemes with continuous leakage resiliency
- An algebraic framework for Diffie-Hellman assumptions
- Bounded tamper resilience: how to go beyond the algebraic barrier
- A practical leakage-resilient signature scheme in the generic group model
- Leakage-resilient ring signature schemes
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions
- Leakage resilient ElGamal encryption
- Continuous after-the-fact leakage-resilient eCK-secure key exchange
- Upgrading fuzzy extractors
- Public-key encryption scheme with optimal continuous leakage resilience
- More efficient post-quantum KEMTLS with pre-distributed public keys
This page was built for publication: Efficient public-key cryptography in the presence of key leakage
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3058682)