Public-key encryption schemes with auxiliary inputs
From MaRDI portal
Publication:3408205
Recommendations
- On cryptography with auxiliary input
- Public-Key Cryptosystems Resilient to Key Leakage
- Better security for deterministic public-key encryption: the auxiliary-input setting
- Public-key cryptosystems resilient to key leakage
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
Cites work
- scientific article; zbMATH DE number 1302835 (Why is no real title available?)
- scientific article; zbMATH DE number 2086698 (Why is no real title available?)
- scientific article; zbMATH DE number 3249395 (Why is no real title available?)
- A Framework for Efficient and Composable Oblivious Transfer
- A Leakage-Resilient Mode of Operation
- Advances in Cryptology - CRYPTO 2003
- Circular-Secure Encryption from Decision Diffie-Hellman
- Exposure-resilient functions and all-or-nothing transforms
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-resilient signatures
- Learning polynomials with queries: The highly noisy case
- Multi-bit Cryptosystems Based on Lattice Problems
- Number-theoretic constructions of efficient pseudo-random functions
- On cryptography with auxiliary input
- On lattices, learning with errors, random linear codes, and cryptography
- One-Time Programs
- Public-Key Cryptosystems Resilient to Key Leakage
- Public-key cryptosystems from the worst-case shortest vector problem
- Signature schemes with bounded leakage resilience
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Theory of Cryptography
- Trapdoors for hard lattices and new cryptographic constructions
Cited in
(55)- Protecting distributed primitives against leakage: equivocal secret sharing and more
- Deniable cryptosystems: simpler constructions and achieving leakage resilience
- Public-key encryption, local pseudorandom generators, and the low-degree method
- Revocable cryptography from learning with errors
- Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE
- Round-optimal verifiable oblivious pseudorandom functions from ideal lattices
- Shorter lattice-based zero-knowledge proofs via one-time commitments
- Hierarchical attribute based encryption with continuous leakage-resilience
- Post-challenge leakage in public-key encryption
- Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions
- Signatures Resilient to Uninvertible Leakage
- ABE with improved auxiliary input for big data security
- Quantum search-to-decision reduction for the LWE problem
- A black-box construction of strongly unforgeable signature scheme in the leakage setting
- Tighter security proofs for GPV-IBE in the quantum random oracle model
- Reproducible circularly secure bit encryption: applications and realizations
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
- Identity-based broadcast encryption with continuous leakage resilience
- On the impossibility of cryptography with tamperable randomness
- Unbounded multi-party computation from learning with errors
- Towards a ring analogue of the leftover hash lemma
- Anonymous IBE, leakage resilience and circular security from new assumptions
- On cryptography with auxiliary input
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience
- Better security for deterministic public-key encryption: the auxiliary-input setting
- Fully leakage-resilient signatures
- Functional encryption for cubic polynomials and implementation
- On the hardness of learning with rounding over small modulus
- Strong authenticated key exchange with auxiliary inputs
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
- Anonymous and leakage resilient IBE and IPE
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model
- Leakage-resilient signatures
- On public key encryption from noisy codewords
- Continuous leakage-resilient certificate-based encryption
- Security Against Related Randomness Attacks via Reconstructive Extractors
- Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption
- Updatable public key encryption in the standard model
- (In)security of ring-LWE under partial key exposure
- Impossibility of strong KDM security with auxiliary input
- Leakage-resilient cryptography from puncturable primitives and obfuscation
- Public key encryption resilient to leakage and tampering attacks
- Pseudo-free families of finite computational elementary abelian \(p\)-groups
- Lockable obfuscation from circularly insecure fully homomorphic encryption
- Public-key encryption from homogeneous CLWE
- BLOOM: bimodal lattice one-out-of-many proofs and applications
- Limits of a conjecture on a leakage-resilient cryptosystem
- Leakage resilient one-way functions: the auxiliary-input setting
- Signature schemes secure against hard-to-invert leakage
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- PAKEs: new framework, new techniques and more efficient lattice-based constructions in the standard model
- Fully homomorphic encryption with auxiliary inputs
- Key-policy attribute-based encryption against continual auxiliary input leakage
This page was built for publication: Public-key encryption schemes with auxiliary inputs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3408205)