Public-key encryption schemes with auxiliary inputs
From MaRDI portal
Publication:3408205
DOI10.1007/978-3-642-11799-2_22zbMATH Open1274.94062OpenAlexW1508077776MaRDI QIDQ3408205FDOQ3408205
Authors: Yevgeniy Dodis, Yael Tauman Kalai, Chris Peikert, Vinod Vaikuntanathan, Shafi Goldwasser
Publication date: 24 February 2010
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-11799-2_22
Recommendations
- On cryptography with auxiliary input
- Public-Key Cryptosystems Resilient to Key Leakage
- Better security for deterministic public-key encryption: the auxiliary-input setting
- Public-key cryptosystems resilient to key leakage
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
Cites Work
- Title not available (Why is that?)
- Public-key cryptosystems from the worst-case shortest vector problem
- On lattices, learning with errors, random linear codes, and cryptography
- Trapdoors for hard lattices and new cryptographic constructions
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Title not available (Why is that?)
- Title not available (Why is that?)
- A Framework for Efficient and Composable Oblivious Transfer
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-resilient signatures
- Circular-Secure Encryption from Decision Diffie-Hellman
- A Leakage-Resilient Mode of Operation
- Signature schemes with bounded leakage resilience
- On cryptography with auxiliary input
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
- Number-theoretic constructions of efficient pseudo-random functions
- Advances in Cryptology - CRYPTO 2003
- Learning polynomials with queries: The highly noisy case
- Multi-bit Cryptosystems Based on Lattice Problems
- Exposure-resilient functions and all-or-nothing transforms
- One-Time Programs
Cited In (54)
- Revocable cryptography from learning with errors
- Protecting distributed primitives against leakage: equivocal secret sharing and more
- Deniable cryptosystems: simpler constructions and achieving leakage resilience
- Hierarchical attribute based encryption with continuous leakage-resilience
- Continuous leakage-resilient certificate-based encryption
- A black-box construction of strongly unforgeable signature scheme in the leakage setting
- Signatures Resilient to Uninvertible Leakage
- On the hardness of learning with rounding over small modulus
- Strong authenticated key exchange with auxiliary inputs
- On cryptography with auxiliary input
- Anonymous IBE, leakage resilience and circular security from new assumptions
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
- Signature schemes secure against hard-to-invert leakage
- Fully homomorphic encryption with auxiliary inputs
- Lockable obfuscation from circularly insecure fully homomorphic encryption
- Public-key encryption from homogeneous CLWE
- ABE with improved auxiliary input for big data security
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model
- Towards a ring analogue of the leftover hash lemma
- Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption
- Post-challenge leakage in public-key encryption
- Quantum search-to-decision reduction for the LWE problem
- Anonymous and leakage resilient IBE and IPE
- Tighter security proofs for GPV-IBE in the quantum random oracle model
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience
- Better security for deterministic public-key encryption: the auxiliary-input setting
- Leakage resilient one-way functions: the auxiliary-input setting
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
- On public key encryption from noisy codewords
- Leakage-resilient signatures
- Unbounded multi-party computation from learning with errors
- Updatable public key encryption in the standard model
- Impossibility of strong KDM security with auxiliary input
- Round-optimal verifiable oblivious pseudorandom functions from ideal lattices
- Shorter lattice-based zero-knowledge proofs via one-time commitments
- Identity-based broadcast encryption with continuous leakage resilience
- (In)security of ring-LWE under partial key exposure
- Leakage-resilient cryptography from puncturable primitives and obfuscation
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- On the impossibility of cryptography with tamperable randomness
- Fully leakage-resilient signatures
- Public key encryption resilient to leakage and tampering attacks
- Reproducible circularly secure bit encryption: applications and realizations
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
- Security Against Related Randomness Attacks via Reconstructive Extractors
- Limits of a conjecture on a leakage-resilient cryptosystem
- PAKEs: new framework, new techniques and more efficient lattice-based constructions in the standard model
- Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions
- Functional encryption for cubic polynomials and implementation
- Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE
- Pseudo-free families of finite computational elementary abelian \(p\)-groups
- BLOOM: bimodal lattice one-out-of-many proofs and applications
- Key-policy attribute-based encryption against continual auxiliary input leakage
This page was built for publication: Public-key encryption schemes with auxiliary inputs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3408205)