Signature schemes with bounded leakage resilience
From MaRDI portal
Publication:3650722
DOI10.1007/978-3-642-10366-7_41zbMATH Open1267.94072OpenAlexW2169985476MaRDI QIDQ3650722FDOQ3650722
Authors: Vinod Vaikuntanathan, Jonathan Katz
Publication date: 15 December 2009
Published in: Advances in Cryptology – ASIACRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-10366-7_41
Recommendations
Cited In (73)
- Leakage resilience of the Blom's key distribution scheme
- Leakage resilient strong key-insulated signatures in public channel
- CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not $$\mathtt {q}$$ -type) Assumptions
- Memory leakage-resilient secret sharing schemes
- Fully Leakage-Resilient Codes
- Leakage-resilient identification schemes from zero-knowledge proofs of storage
- NIZK from SNARGs
- Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority
- Crypto galore!
- Constructing tree decompositions of graphs with bounded gonality
- A lower bound on the key length of information-theoretic forward-secure storage schemes
- Hierarchical attribute based encryption with continuous leakage-resilience
- Leakage resilience from program obfuscation
- On symmetric encryption and point obfuscation
- Obfuscation of hyperplane membership
- A black-box construction of strongly unforgeable signature scheme in the leakage setting
- Leakage-resilient group signature: definitions and constructions
- Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency
- Security of message authentication codes in the presence of key-dependent messages
- Forward-security under continual leakage
- Signatures Resilient to Uninvertible Leakage
- On continual leakage of discrete log representations
- Strong authenticated key exchange with auxiliary inputs
- Signature schemes secure against hard-to-invert leakage
- Leakage-resilient cryptography from minimal assumptions
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Leakage-Resilient Signatures with Graceful Degradation
- New approach to practical leakage-resilient public-key cryptography
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model
- Regular lossy functions and their applications in leakage-resilient cryptography
- Towards a ring analogue of the leftover hash lemma
- Leakage-resilient cryptography from minimal assumptions
- Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
- Leakage resilient one-way functions: the auxiliary-input setting
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
- Unifying leakage classes: simulatable leakage and pseudoentropy
- Leakage-resilient signatures
- Public-key encryption schemes with auxiliary inputs
- On the connection between leakage tolerance and adaptive security
- Signatures resilient to continual leakage on memory and computation
- Mind your coins: fully leakage-resilient signatures with graceful degradation
- The generic construction of continuous leakage-resilient identity-based cryptosystems
- Efficient fully-leakage resilient one-more signature schemes
- Leakage-resilient hierarchical identity-based encryption with recipient anonymity
- Witness maps and applications
- Two-dimensional representation of cover free families and its applications: short signatures and more
- Leakage-resilient coin tossing
- Black-box constructions of signature schemes in the bounded leakage setting
- Identity-based broadcast encryption with continuous leakage resilience
- Another look at security definitions
- On the leakage-resilient key exchange
- (In)security of ring-LWE under partial key exposure
- Leakage-resilient cryptography from puncturable primitives and obfuscation
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- Naor-Yung paradigm with shared randomness and applications
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks
- Fully leakage-resilient signatures
- Title not available (Why is that?)
- Title not available (Why is that?)
- Naor-Yung Paradigm with Shared Randomness and Applications
- Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications
- Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy
- Fully Leakage-Resilient Signatures
- A practical leakage-resilient signature scheme in the generic group model
- A black-box construction of strongly unforgeable signature schemes in the bounded leakage model
- Leakage-resilient ring signature schemes
- Bounded tamper resilience: how to go beyond the algebraic barrier
- Limits of a conjecture on a leakage-resilient cryptosystem
- On black-box extensions of non-interactive zero-knowledge arguments, and signatures directly from simulation soundness
- Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions
- Continuous after-the-fact leakage-resilient eCK-secure key exchange
- On the tightness of forward-secure signature reductions
- Unifying leakage models: from probing attacks to noisy leakage
This page was built for publication: Signature schemes with bounded leakage resilience
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3650722)