A practical leakage-resilient signature scheme in the generic group model
From MaRDI portal
Publication:3455486
Recommendations
Cites work
- A Leakage-Resilient Mode of Operation
- Efficient public-key cryptography in the presence of key leakage
- Fast Probabilistic Algorithms for Verification of Polynomial Identities
- Fully Leakage-Resilient Signatures
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Leakage resilient ElGamal encryption
- Leakage-resilient cryptography from the inner-product extractor
- Leakage-resilient signatures
- Short signatures without random oracles and the SDH assumption in bilinear groups
- Signature schemes with bounded leakage resilience
- Signatures resilient to continual leakage on memory and computation
- The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy
Cited in
(11)- Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority
- On continual leakage of discrete log representations
- scientific article; zbMATH DE number 1420967 (Why is no real title available?)
- Black-box constructions of signature schemes in the bounded leakage setting
- A Leakage Resilient MAC
- scientific article; zbMATH DE number 5198942 (Why is no real title available?)
- A leakage-resilient pairing-based variant of the Schnorr signature scheme
- Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications
- Leakage-resilient revocable identity-based signature with cloud revocation authority
- A group identification protocol with leakage resilience of secret sharing scheme
- Leakage-resilient group signature: definitions and constructions
This page was built for publication: A practical leakage-resilient signature scheme in the generic group model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3455486)