Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
From MaRDI portal
Publication:3183555
DOI10.1007/978-3-642-03356-8_3zbMath1252.94041OpenAlexW1588518948MaRDI QIDQ3183555
Daniel Wichs, Yevgeniy Dodis, Joël Alwen
Publication date: 20 October 2009
Published in: Advances in Cryptology - CRYPTO 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-03356-8_3
Related Items (72)
Witness Maps and Applications ⋮ Efficient and secure big data storage system with leakage resilience in cloud computing ⋮ Signature schemes secure against hard-to-invert leakage ⋮ Provable time-memory trade-offs: symmetric cryptography against memory-bounded adversaries ⋮ Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation ⋮ Targeted lossy functions and applications ⋮ Fully Homomorphic Encryption with Auxiliary Inputs ⋮ One-Time Programs with Limited Memory ⋮ Leakage-resilient cryptography from minimal assumptions ⋮ Leakage Resilient One-Way Functions: The Auxiliary-Input Setting ⋮ Crypto Galore! ⋮ Regular lossy functions and their applications in leakage-resilient cryptography ⋮ Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange ⋮ Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage ⋮ Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience ⋮ Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority ⋮ Fully leakage-resilient signatures ⋮ Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption ⋮ Naor-Yung paradigm with shared randomness and applications ⋮ ABE with improved auxiliary input for big data security ⋮ Incompressible cryptography ⋮ Strong authenticated key exchange with auxiliary inputs ⋮ Leakage Resilience of the Blom’s Key Distribution Scheme ⋮ Threshold public key encryption scheme resilient against continual leakage without random oracles ⋮ Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage ⋮ Implications of the arithmetic ratio of prime numbers for RSA security ⋮ Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications ⋮ Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions ⋮ Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices ⋮ IBE with incompressible master secret and small identity secrets ⋮ Rate-1 incompressible encryption from standard assumptions ⋮ A modular approach to the incompressibility of block-cipher-based AEADs ⋮ Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption ⋮ Provably secure certificate-based encryption with leakage resilience ⋮ Impossibilities in succinct arguments: black-box extraction and more ⋮ A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting ⋮ Quasi chain rule for min-entropy ⋮ Leakage-resilient cryptography from puncturable primitives and obfuscation ⋮ Leakage-resilient ring signature schemes ⋮ Hierarchical attribute based encryption with continuous leakage-resilience ⋮ Bounded-Retrieval Model with Keys Derived from Private Data ⋮ Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation ⋮ Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation Authority ⋮ Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience ⋮ Subversion-resilient signatures: definitions, constructions and applications ⋮ Bounded tamper resilience: how to go beyond the algebraic barrier ⋮ Leakage-resilient attribute based encryption in prime-order groups via predicate encodings ⋮ Leakage-resilient group signature: definitions and constructions ⋮ Post-challenge leakage in public-key encryption ⋮ Fully Leakage-Resilient Codes ⋮ A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes ⋮ New approach to practical leakage-resilient public-key cryptography ⋮ Leakage resilient one-way functions: the auxiliary-input setting ⋮ Continuous leakage-resilient certificate-based encryption ⋮ Novel updatable identity-based hash proof system and its applications ⋮ Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model ⋮ Optimal Amplification of Noisy Leakages ⋮ Novel generic construction of leakage-resilient PKE scheme with CCA security ⋮ Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model ⋮ Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity ⋮ Expedient Non-malleability Notions for Hash Functions ⋮ Randomness Leakage in the KEM/DEM Framework ⋮ Naor-Yung Paradigm with Shared Randomness and Applications ⋮ Leakage Resilient Strong Key-Insulated Signatures in Public Channel ⋮ Big-Key Symmetric Encryption: Resisting Key Exfiltration ⋮ On Symmetric Encryption and Point Obfuscation ⋮ Leakage-Resilient Signatures ⋮ Public-Key Encryption Schemes with Auxiliary Inputs ⋮ Continuous leakage-resilient identity-based encryption with leakage amplification ⋮ Strongly leakage resilient authenticated key exchange, revisited ⋮ Leakage-resilient key exchange and two-seed extractors ⋮ Incompressible encodings
Uses Software
This page was built for publication: Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model