Public-Key Encryption Schemes with Auxiliary Inputs
From MaRDI portal
Publication:3408205
DOI10.1007/978-3-642-11799-2_22zbMath1274.94062OpenAlexW1508077776MaRDI QIDQ3408205
Yevgeniy Dodis, Shafi Goldwasser, Yael Tauman Kalai, Vinod Vaikuntanathan, Chris Peikert
Publication date: 24 February 2010
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-11799-2_22
Related Items
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model, Signature schemes secure against hard-to-invert leakage, Fully Homomorphic Encryption with Auxiliary Inputs, Leakage Resilient One-Way Functions: The Auxiliary-Input Setting, Security Against Related Randomness Attacks via Reconstructive Extractors, Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience, Anonymous IBE, leakage resilience and circular security from new assumptions, Fully leakage-resilient signatures, ABE with improved auxiliary input for big data security, Public key encryption resilient to leakage and tampering attacks, Strong authenticated key exchange with auxiliary inputs, Anonymous and leakage resilient IBE and IPE, On the impossibility of cryptography with tamperable randomness, Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions, Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices, BLOOM: bimodal lattice one-out-of-many proofs and applications, Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption, Lockable obfuscation from circularly insecure fully homomorphic encryption, Reproducible circularly secure bit encryption: applications and realizations, Quantum search-to-decision reduction for the LWE problem, Key-policy attribute-based encryption against continual auxiliary input leakage, A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting, Updatable public key encryption in the standard model, Leakage-resilient cryptography from puncturable primitives and obfuscation, Hierarchical attribute based encryption with continuous leakage-resilience, Limits of a conjecture on a leakage-resilient cryptosystem, Functional encryption for cubic polynomials and implementation, Leakage-resilient attribute based encryption in prime-order groups via predicate encodings, Pseudo-free families of finite computational elementary abelian \(p\)-groups, Post-challenge leakage in public-key encryption, (In)security of ring-LWE under partial key exposure, Towards a ring analogue of the leftover hash lemma, Leakage resilient one-way functions: the auxiliary-input setting, Continuous leakage-resilient certificate-based encryption, On the Hardness of Learning with Rounding over Small Modulus, Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model, Tighter security proofs for GPV-IBE in the quantum random oracle model, Better security for deterministic public-key encryption: the auxiliary-input setting, Unbounded multi-party computation from learning with errors, Shorter lattice-based zero-knowledge proofs via one-time commitments, Round-optimal verifiable oblivious pseudorandom functions from ideal lattices, Signatures Resilient to Uninvertible Leakage, Leakage-Resilient Signatures, Identity-based broadcast encryption with continuous leakage resilience, Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle, Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Learning Polynomials with Queries: The Highly Noisy Case
- Number-theoretic constructions of efficient pseudo-random functions
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-Resilient Signatures
- Trapdoors for hard lattices and new cryptographic constructions
- One-Time Programs
- Circular-Secure Encryption from Decision Diffie-Hellman
- A Framework for Efficient and Composable Oblivious Transfer
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- A Leakage-Resilient Mode of Operation
- Signature Schemes with Bounded Leakage Resilience
- Public-key cryptosystems from the worst-case shortest vector problem
- On cryptography with auxiliary input
- Advances in Cryptology - CRYPTO 2003
- Multi-bit Cryptosystems Based on Lattice Problems
- Public-Key Cryptosystems Resilient to Key Leakage
- On lattices, learning with errors, random linear codes, and cryptography
- Theory of Cryptography