Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model

From MaRDI portal
Publication:3183555

DOI10.1007/978-3-642-03356-8_3zbMath1252.94041OpenAlexW1588518948MaRDI QIDQ3183555

Daniel Wichs, Yevgeniy Dodis, Joël Alwen

Publication date: 20 October 2009

Published in: Advances in Cryptology - CRYPTO 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-03356-8_3




Related Items (72)

Witness Maps and ApplicationsEfficient and secure big data storage system with leakage resilience in cloud computingSignature schemes secure against hard-to-invert leakageProvable time-memory trade-offs: symmetric cryptography against memory-bounded adversariesMind Your Coins: Fully Leakage-Resilient Signatures with Graceful DegradationTargeted lossy functions and applicationsFully Homomorphic Encryption with Auxiliary InputsOne-Time Programs with Limited MemoryLeakage-resilient cryptography from minimal assumptionsLeakage Resilient One-Way Functions: The Auxiliary-Input SettingCrypto Galore!Regular lossy functions and their applications in leakage-resilient cryptographyContinuous After-the-Fact Leakage-Resilient eCK-Secure Key ExchangeLeakage-Resilient Identification Schemes from Zero-Knowledge Proofs of StorageAdaptive-secure identity-based inner-product functional encryption and its leakage-resilienceLeakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation AuthorityFully leakage-resilient signaturesConstant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent AssumptionNaor-Yung paradigm with shared randomness and applicationsABE with improved auxiliary input for big data securityIncompressible cryptographyStrong authenticated key exchange with auxiliary inputsLeakage Resilience of the Blom’s Key Distribution SchemeThreshold public key encryption scheme resilient against continual leakage without random oraclesUpdatable Lossy Trapdoor Functions and Its Application in Continuous LeakageImplications of the arithmetic ratio of prime numbers for RSA securityFully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile CommunicationsStrongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard AssumptionsLeakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from latticesIBE with incompressible master secret and small identity secretsRate-1 incompressible encryption from standard assumptionsA modular approach to the incompressibility of block-cipher-based AEADsIdentity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear AssumptionProvably secure certificate-based encryption with leakage resilienceImpossibilities in succinct arguments: black-box extraction and moreA Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage SettingQuasi chain rule for min-entropyLeakage-resilient cryptography from puncturable primitives and obfuscationLeakage-resilient ring signature schemesHierarchical attribute based encryption with continuous leakage-resilienceBounded-Retrieval Model with Keys Derived from Private DataLeakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability ObfuscationLeakage-Resilient Revocable Identity-Based Signature with Cloud Revocation AuthorityTamper-Proof Circuits: How to Trade Leakage for Tamper-ResilienceSubversion-resilient signatures: definitions, constructions and applicationsBounded tamper resilience: how to go beyond the algebraic barrierLeakage-resilient attribute based encryption in prime-order groups via predicate encodingsLeakage-resilient group signature: definitions and constructionsPost-challenge leakage in public-key encryptionFully Leakage-Resilient CodesA Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage SchemesNew approach to practical leakage-resilient public-key cryptographyLeakage resilient one-way functions: the auxiliary-input settingContinuous leakage-resilient certificate-based encryptionNovel updatable identity-based hash proof system and its applicationsFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelOptimal Amplification of Noisy LeakagesNovel generic construction of leakage-resilient PKE scheme with CCA securityNovel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard ModelLeakage-Resilient Hierarchical Identity-Based Encryption with Recipient AnonymityExpedient Non-malleability Notions for Hash FunctionsRandomness Leakage in the KEM/DEM FrameworkNaor-Yung Paradigm with Shared Randomness and ApplicationsLeakage Resilient Strong Key-Insulated Signatures in Public ChannelBig-Key Symmetric Encryption: Resisting Key ExfiltrationOn Symmetric Encryption and Point ObfuscationLeakage-Resilient SignaturesPublic-Key Encryption Schemes with Auxiliary InputsContinuous leakage-resilient identity-based encryption with leakage amplificationStrongly leakage resilient authenticated key exchange, revisitedLeakage-resilient key exchange and two-seed extractorsIncompressible encodings


Uses Software



This page was built for publication: Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model