Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model

From MaRDI portal
Publication:3183555


DOI10.1007/978-3-642-03356-8_3zbMath1252.94041MaRDI QIDQ3183555

Daniel Wichs, Yevgeniy Dodis, Joël Alwen

Publication date: 20 October 2009

Published in: Advances in Cryptology - CRYPTO 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-03356-8_3


94A60: Cryptography


Related Items

A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting, A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes, Witness Maps and Applications, Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority, Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation Authority, Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model, Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity, Fully Leakage-Resilient Codes, Implications of the arithmetic ratio of prime numbers for RSA security, Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications, Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions, Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices, IBE with incompressible master secret and small identity secrets, Rate-1 incompressible encryption from standard assumptions, A modular approach to the incompressibility of block-cipher-based AEADs, Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption, Impossibilities in succinct arguments: black-box extraction and more, Signature schemes secure against hard-to-invert leakage, Leakage-resilient cryptography from minimal assumptions, Bounded tamper resilience: how to go beyond the algebraic barrier, Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model, Efficient and secure big data storage system with leakage resilience in cloud computing, Provable time-memory trade-offs: symmetric cryptography against memory-bounded adversaries, Regular lossy functions and their applications in leakage-resilient cryptography, Provably secure certificate-based encryption with leakage resilience, Quasi chain rule for min-entropy, Leakage-resilient cryptography from puncturable primitives and obfuscation, Leakage-resilient ring signature schemes, Leakage-resilient attribute based encryption in prime-order groups via predicate encodings, Leakage resilient one-way functions: the auxiliary-input setting, Subversion-resilient signatures: definitions, constructions and applications, Leakage-resilient group signature: definitions and constructions, New approach to practical leakage-resilient public-key cryptography, Novel generic construction of leakage-resilient PKE scheme with CCA security, Leakage-resilient key exchange and two-seed extractors, Incompressible encodings, Targeted lossy functions and applications, Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience, Incompressible cryptography, Hierarchical attribute based encryption with continuous leakage-resilience, Post-challenge leakage in public-key encryption, Continuous leakage-resilient certificate-based encryption, Novel updatable identity-based hash proof system and its applications, Continuous leakage-resilient identity-based encryption with leakage amplification, Strongly leakage resilient authenticated key exchange, revisited, Fully leakage-resilient signatures, Naor-Yung paradigm with shared randomness and applications, ABE with improved auxiliary input for big data security, Strong authenticated key exchange with auxiliary inputs, Threshold public key encryption scheme resilient against continual leakage without random oracles, Optimal Amplification of Noisy Leakages, Naor-Yung Paradigm with Shared Randomness and Applications, Big-Key Symmetric Encryption: Resisting Key Exfiltration, Crypto Galore!, Leakage Resilience of the Blom’s Key Distribution Scheme, Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage, Bounded-Retrieval Model with Keys Derived from Private Data, Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation, Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience, Expedient Non-malleability Notions for Hash Functions, Randomness Leakage in the KEM/DEM Framework, Leakage Resilient Strong Key-Insulated Signatures in Public Channel, Leakage Resilient One-Way Functions: The Auxiliary-Input Setting, Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption, On Symmetric Encryption and Point Obfuscation, Leakage-Resilient Signatures, Public-Key Encryption Schemes with Auxiliary Inputs, Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation, Fully Homomorphic Encryption with Auxiliary Inputs, One-Time Programs with Limited Memory, Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange, Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage


Uses Software