Signature Schemes with Bounded Leakage Resilience

From MaRDI portal
Publication:3650722

DOI10.1007/978-3-642-10366-7_41zbMath1267.94072OpenAlexW2169985476MaRDI QIDQ3650722

Vinod Vaikuntanathan, Jonathan N. Katz

Publication date: 15 December 2009

Published in: Advances in Cryptology – ASIACRYPT 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-10366-7_41




Related Items

Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and MoreWitness Maps and ApplicationsOn Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation SoundnessSignature schemes secure against hard-to-invert leakageMemory leakage-resilient secret sharing schemesMind Your Coins: Fully Leakage-Resilient Signatures with Graceful DegradationThe generic construction of continuous leakage-resilient identity-based cryptosystemsA Practical Leakage-Resilient Signature Scheme in the Generic Group ModelLeakage-resilient cryptography from minimal assumptionsLeakage Resilient One-Way Functions: The Auxiliary-Input SettingCrypto Galore!Regular lossy functions and their applications in leakage-resilient cryptographyContinuous After-the-Fact Leakage-Resilient eCK-Secure Key ExchangeLeakage-Resilient Identification Schemes from Zero-Knowledge Proofs of StorageLeakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation AuthorityFully leakage-resilient signaturesNaor-Yung paradigm with shared randomness and applicationsStrong authenticated key exchange with auxiliary inputsPublic-key encryption for protecting data in cloud system with intelligent agents against side-channel attacksUnifying Leakage Classes: Simulatable Leakage and PseudoentropyLeakage Resilience of the Blom’s Key Distribution SchemeOn the leakage-resilient key exchangeA Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage ModelFully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile CommunicationsStrongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard AssumptionsNIZK from SNARGsEfficient Public-Key Cryptography with Bounded Leakage and Tamper ResilienceSecurity of message authentication codes in the presence of key-dependent messagesA Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage SettingComputational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropyLeakage-resilient cryptography from puncturable primitives and obfuscationLeakage-resilient ring signature schemesHierarchical attribute based encryption with continuous leakage-resilienceOn the tightness of forward-secure signature reductionsUnifying leakage models: from probing attacks to noisy leakageTamper-Proof Circuits: How to Trade Leakage for Tamper-ResilienceBounded tamper resilience: how to go beyond the algebraic barrierOn the Connection between Leakage Tolerance and Adaptive SecurityLeakage-resilient coin tossingLeakage-resilient group signature: definitions and constructionsFully Leakage-Resilient CodesA Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage SchemesNew approach to practical leakage-resilient public-key cryptography(In)security of ring-LWE under partial key exposureTowards a ring analogue of the leftover hash lemmaLeakage resilient one-way functions: the auxiliary-input settingFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelLeakage-Resilient Hierarchical Identity-Based Encryption with Recipient AnonymityConstructing tree decompositions of graphs with bounded gonalityNaor-Yung Paradigm with Shared Randomness and ApplicationsSignatures Resilient to Uninvertible LeakageLeakage Resilient Strong Key-Insulated Signatures in Public ChannelLeakage resilience from program obfuscationOn Symmetric Encryption and Point ObfuscationObfuscation of Hyperplane MembershipLeakage-Resilient SignaturesPublic-Key Encryption Schemes with Auxiliary InputsBlack-box constructions of signature schemes in the bounded leakage settingIdentity-based broadcast encryption with continuous leakage resilienceMode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle




This page was built for publication: Signature Schemes with Bounded Leakage Resilience