Efficient Public-Key Cryptography in the Presence of Key Leakage
From MaRDI portal
Publication:3058682
DOI10.1007/978-3-642-17373-8_35zbMath1290.94064OpenAlexW1500578148MaRDI QIDQ3058682
Adriana López-Alt, Kristiyan Haralambiev, Yevgeniy Dodis, Daniel Wichs
Publication date: 7 December 2010
Published in: Advances in Cryptology - ASIACRYPT 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-17373-8_35
Related Items (79)
Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing ⋮ Witness Maps and Applications ⋮ Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes ⋮ Signature schemes secure against hard-to-invert leakage ⋮ Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation ⋮ How to Compute in the Presence of Leakage ⋮ Tightly secure signatures and public-key encryption ⋮ The generic construction of continuous leakage-resilient identity-based cryptosystems ⋮ Fully Homomorphic Encryption with Auxiliary Inputs ⋮ A Practical Leakage-Resilient Signature Scheme in the Generic Group Model ⋮ Leakage-resilient cryptography from minimal assumptions ⋮ Leakage Resilient One-Way Functions: The Auxiliary-Input Setting ⋮ Regular lossy functions and their applications in leakage-resilient cryptography ⋮ Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange ⋮ Issuer-hiding attribute-based credentials ⋮ Fully leakage-resilient signatures ⋮ Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency ⋮ Naor-Yung paradigm with shared randomness and applications ⋮ Public key encryption resilient to leakage and tampering attacks ⋮ Strong authenticated key exchange with auxiliary inputs ⋮ Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks ⋮ A Unified Framework for Non-universal SNARKs ⋮ Anonymous and leakage resilient IBE and IPE ⋮ Continuously non-malleable secret sharing for general access structures ⋮ Generalizing Efficient Multiparty Computation ⋮ Updatable all-but-one dual projective hashing and its applications ⋮ Leakage Resilience of the Blom’s Key Distribution Scheme ⋮ Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge ⋮ Leakage-resilient identity-based cryptography from minimal assumptions ⋮ A map of witness maps: new definitions and connections ⋮ On the impossibility of cryptography with tamperable randomness ⋮ NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion ⋮ Public-key encryption scheme with optimal continuous leakage resilience ⋮ Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions ⋮ NIZK from SNARGs ⋮ Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices ⋮ Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience ⋮ Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions ⋮ What makes Fiat-Shamir zkSNARKs (updatable SRS) simulation extractable? ⋮ Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds) ⋮ Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption ⋮ Lockable obfuscation from circularly insecure fully homomorphic encryption ⋮ Nonmalleable digital lockers and robust fuzzy extractors in the plain model ⋮ Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy ⋮ Updatable public key encryption in the standard model ⋮ Leakage-resilient cryptography from puncturable primitives and obfuscation ⋮ Continuously non-malleable codes in the split-state model ⋮ Leakage-resilient ring signature schemes ⋮ Bounded tamper resilience: how to go beyond the algebraic barrier ⋮ An algebraic framework for Diffie-Hellman assumptions ⋮ Tagged One-Time Signatures: Tight Security and Optimal Tag Size ⋮ On the Connection between Leakage Tolerance and Adaptive Security ⋮ Leakage-resilient coin tossing ⋮ Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing ⋮ Leakage-resilient group signature: definitions and constructions ⋮ Post-challenge leakage in public-key encryption ⋮ Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts ⋮ New approach to practical leakage-resilient public-key cryptography ⋮ Continuously non-malleable codes with split-state refresh ⋮ (In)security of ring-LWE under partial key exposure ⋮ Towards a ring analogue of the leftover hash lemma ⋮ Leakage resilient one-way functions: the auxiliary-input setting ⋮ Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice ⋮ On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives ⋮ Novel updatable identity-based hash proof system and its applications ⋮ Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model ⋮ Optimal Amplification of Noisy Leakages ⋮ Novel generic construction of leakage-resilient PKE scheme with CCA security ⋮ Leakage-Resilient Functional Encryption via Pair Encodings ⋮ The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free ⋮ Deterministic Public-Key Encryption Under Continual Leakage ⋮ Impossibility on tamper-resilient cryptography with uniqueness properties ⋮ Naor-Yung Paradigm with Shared Randomness and Applications ⋮ Signatures Resilient to Uninvertible Leakage ⋮ Spooky Encryption and Its Applications ⋮ Leakage resilience from program obfuscation ⋮ Continuous leakage-resilient identity-based encryption with leakage amplification ⋮ Structure-preserving public-key encryption with leakage-resilient CCA security ⋮ Strongly leakage resilient authenticated key exchange, revisited
This page was built for publication: Efficient Public-Key Cryptography in the Presence of Key Leakage