The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
From MaRDI portal
Publication:3604445
DOI10.1109/TIT.2008.921864zbMATH Open1326.94090WikidataQ99673047 ScholiaQ99673047MaRDI QIDQ3604445FDOQ3604445
Authors: Stefan Dziembowski, Ueli M. Maurer
Publication date: 24 February 2009
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Recommendations
Cryptography (94A60) Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30)
Cited In (13)
- Long term confidentiality: a survey
- Advances in Cryptology - EUROCRYPT 2004
- On Everlasting Security in the Hybrid Bounded Storage Model
- Optimal randomizer efficiency in the bounded-storage model
- Advances in Cryptology - CRYPTO 2003
- Bit commitment in the bounded storage model: tight bound and simple optimal construction
- Everlasting security in the bounded storage model
- Title not available (Why is that?)
- Everlasting UC commitments from fully malicious PUFs
- Title not available (Why is that?)
- Quantum cryptography beyond quantum key distribution
- Disappearing cryptography in the bounded storage model
- A lower bound on the key length of information-theoretic forward-secure storage schemes
This page was built for publication: The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3604445)