Public-Key Encryption Schemes with Auxiliary Inputs

From MaRDI portal
Publication:3408205

DOI10.1007/978-3-642-11799-2_22zbMath1274.94062OpenAlexW1508077776MaRDI QIDQ3408205

Yevgeniy Dodis, Shafi Goldwasser, Yael Tauman Kalai, Vinod Vaikuntanathan, Chris Peikert

Publication date: 24 February 2010

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-11799-2_22



Related Items

PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model, Signature schemes secure against hard-to-invert leakage, Fully Homomorphic Encryption with Auxiliary Inputs, Leakage Resilient One-Way Functions: The Auxiliary-Input Setting, Security Against Related Randomness Attacks via Reconstructive Extractors, Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience, Anonymous IBE, leakage resilience and circular security from new assumptions, Fully leakage-resilient signatures, ABE with improved auxiliary input for big data security, Public key encryption resilient to leakage and tampering attacks, Strong authenticated key exchange with auxiliary inputs, Anonymous and leakage resilient IBE and IPE, On the impossibility of cryptography with tamperable randomness, Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions, Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices, BLOOM: bimodal lattice one-out-of-many proofs and applications, Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption, Lockable obfuscation from circularly insecure fully homomorphic encryption, Reproducible circularly secure bit encryption: applications and realizations, Quantum search-to-decision reduction for the LWE problem, Key-policy attribute-based encryption against continual auxiliary input leakage, A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting, Updatable public key encryption in the standard model, Leakage-resilient cryptography from puncturable primitives and obfuscation, Hierarchical attribute based encryption with continuous leakage-resilience, Limits of a conjecture on a leakage-resilient cryptosystem, Functional encryption for cubic polynomials and implementation, Leakage-resilient attribute based encryption in prime-order groups via predicate encodings, Pseudo-free families of finite computational elementary abelian \(p\)-groups, Post-challenge leakage in public-key encryption, (In)security of ring-LWE under partial key exposure, Towards a ring analogue of the leftover hash lemma, Leakage resilient one-way functions: the auxiliary-input setting, Continuous leakage-resilient certificate-based encryption, On the Hardness of Learning with Rounding over Small Modulus, Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model, Tighter security proofs for GPV-IBE in the quantum random oracle model, Better security for deterministic public-key encryption: the auxiliary-input setting, Unbounded multi-party computation from learning with errors, Shorter lattice-based zero-knowledge proofs via one-time commitments, Round-optimal verifiable oblivious pseudorandom functions from ideal lattices, Signatures Resilient to Uninvertible Leakage, Leakage-Resilient Signatures, Identity-based broadcast encryption with continuous leakage resilience, Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle, Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE



Cites Work