Simultaneous Hardcore Bits and Cryptography against Memory Attacks

From MaRDI portal
Publication:3611783

DOI10.1007/978-3-642-00457-5_28zbMath1213.94075OpenAlexW1606729219MaRDI QIDQ3611783

Vinod Vaikuntanathan, Adi Akavia, Shafi Goldwasser

Publication date: 3 March 2009

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-00457-5_28



Related Items

Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing, Non-malleable functions and their applications, Efficient and secure big data storage system with leakage resilience in cloud computing, Signature schemes secure against hard-to-invert leakage, Memory leakage-resilient secret sharing schemes, Targeted lossy functions and applications, Fully Homomorphic Encryption with Auxiliary Inputs, One-Time Programs with Limited Memory, Leakage-resilient cryptography from minimal assumptions, Leakage Resilient One-Way Functions: The Auxiliary-Input Setting, Regular lossy functions and their applications in leakage-resilient cryptography, Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange, Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience, Anonymous IBE, leakage resilience and circular security from new assumptions, Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority, Fully leakage-resilient signatures, Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency, Naor-Yung paradigm with shared randomness and applications, ABE with improved auxiliary input for big data security, Public key encryption resilient to leakage and tampering attacks, Strong authenticated key exchange with auxiliary inputs, Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks, Anonymous and leakage resilient IBE and IPE, Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing, Updatable all-but-one dual projective hashing and its applications, Leakage Resilience of the Blom’s Key Distribution Scheme, On the leakage-resilient key exchange, Threshold public key encryption scheme resilient against continual leakage without random oracles, On the impossibility of cryptography with tamperable randomness, Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage, A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model, Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks, Almost tight multi-user security under adaptive corruptions \& leakages in the standard model, Short leakage resilient and non-malleable secret sharing schemes, Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions, NIZK from SNARGs, Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices, Strong continuous non-malleable encoding schemes with tamper-detection, Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption, Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits, Lockable obfuscation from circularly insecure fully homomorphic encryption, Instantiability of classical random-oracle-model encryption transforms, Reproducible circularly secure bit encryption: applications and realizations, Provably secure certificate-based encryption with leakage resilience, New bounds on the local leakage resilience of Shamir's secret sharing scheme, Key-policy attribute-based encryption against continual auxiliary input leakage, A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting, Updatable public key encryption in the standard model, Leakage-resilient cryptography from puncturable primitives and obfuscation, Leakage-resilient ring signature schemes, Hierarchical attribute based encryption with continuous leakage-resilience, Unifying leakage models: from probing attacks to noisy leakage, Computational fuzzy extractors, Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption, Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification, Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience, New Algorithms for Learning in Presence of Errors, Leakage-resilient attribute based encryption in prime-order groups via predicate encodings, Leakage-resilient coin tossing, Leakage-resilient group signature: definitions and constructions, Post-challenge leakage in public-key encryption, A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes, New approach to practical leakage-resilient public-key cryptography, (In)security of ring-LWE under partial key exposure, Towards a ring analogue of the leftover hash lemma, Leakage resilient one-way functions: the auxiliary-input setting, Continuous leakage-resilient certificate-based encryption, On the local leakage resilience of linear secret sharing schemes, Optimal Amplification of Noisy Leakages, Verifying quantum computations at scale: A cryptographic leash on quantum devices, Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity, Cryptography without (Hardly Any) Secrets ?, A Leakage-Resilient Mode of Operation, Better security for deterministic public-key encryption: the auxiliary-input setting, Deterministic Public-Key Encryption Under Continual Leakage, Randomness Leakage in the KEM/DEM Framework, Leakage-Resilient Coin Tossing, Naor-Yung Paradigm with Shared Randomness and Applications, Signatures Resilient to Uninvertible Leakage, Leakage resilience from program obfuscation, The magic of ELFs, The Magic of ELFs, On Symmetric Encryption and Point Obfuscation, On Related-Secret Pseudorandomness, Leakage-Resilient Signatures, Public-Key Encryption Schemes with Auxiliary Inputs, Public-Key Cryptographic Primitives Provably as Secure as Subset Sum, Black-box constructions of signature schemes in the bounded leakage setting, Identity-based broadcast encryption with continuous leakage resilience, Structure-preserving public-key encryption with leakage-resilient CCA security, Strongly leakage resilient authenticated key exchange, revisited, Leakage-resilient key exchange and two-seed extractors, Quantum signature without classical private key