Signature Schemes with Bounded Leakage Resilience
From MaRDI portal
Publication:3650722
DOI10.1007/978-3-642-10366-7_41zbMath1267.94072OpenAlexW2169985476MaRDI QIDQ3650722
Vinod Vaikuntanathan, Jonathan N. Katz
Publication date: 15 December 2009
Published in: Advances in Cryptology – ASIACRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-10366-7_41
Related Items
Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More ⋮ Witness Maps and Applications ⋮ On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation Soundness ⋮ Signature schemes secure against hard-to-invert leakage ⋮ Memory leakage-resilient secret sharing schemes ⋮ Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation ⋮ The generic construction of continuous leakage-resilient identity-based cryptosystems ⋮ A Practical Leakage-Resilient Signature Scheme in the Generic Group Model ⋮ Leakage-resilient cryptography from minimal assumptions ⋮ Leakage Resilient One-Way Functions: The Auxiliary-Input Setting ⋮ Crypto Galore! ⋮ Regular lossy functions and their applications in leakage-resilient cryptography ⋮ Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange ⋮ Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage ⋮ Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority ⋮ Fully leakage-resilient signatures ⋮ Naor-Yung paradigm with shared randomness and applications ⋮ Strong authenticated key exchange with auxiliary inputs ⋮ Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks ⋮ Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy ⋮ Leakage Resilience of the Blom’s Key Distribution Scheme ⋮ On the leakage-resilient key exchange ⋮ A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model ⋮ Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications ⋮ Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions ⋮ NIZK from SNARGs ⋮ Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience ⋮ Security of message authentication codes in the presence of key-dependent messages ⋮ A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting ⋮ Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy ⋮ Leakage-resilient cryptography from puncturable primitives and obfuscation ⋮ Leakage-resilient ring signature schemes ⋮ Hierarchical attribute based encryption with continuous leakage-resilience ⋮ On the tightness of forward-secure signature reductions ⋮ Unifying leakage models: from probing attacks to noisy leakage ⋮ Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience ⋮ Bounded tamper resilience: how to go beyond the algebraic barrier ⋮ On the Connection between Leakage Tolerance and Adaptive Security ⋮ Leakage-resilient coin tossing ⋮ Leakage-resilient group signature: definitions and constructions ⋮ Fully Leakage-Resilient Codes ⋮ A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes ⋮ New approach to practical leakage-resilient public-key cryptography ⋮ (In)security of ring-LWE under partial key exposure ⋮ Towards a ring analogue of the leftover hash lemma ⋮ Leakage resilient one-way functions: the auxiliary-input setting ⋮ Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model ⋮ Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity ⋮ Constructing tree decompositions of graphs with bounded gonality ⋮ Naor-Yung Paradigm with Shared Randomness and Applications ⋮ Signatures Resilient to Uninvertible Leakage ⋮ Leakage Resilient Strong Key-Insulated Signatures in Public Channel ⋮ Leakage resilience from program obfuscation ⋮ On Symmetric Encryption and Point Obfuscation ⋮ Obfuscation of Hyperplane Membership ⋮ Leakage-Resilient Signatures ⋮ Public-Key Encryption Schemes with Auxiliary Inputs ⋮ Black-box constructions of signature schemes in the bounded leakage setting ⋮ Identity-based broadcast encryption with continuous leakage resilience ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
This page was built for publication: Signature Schemes with Bounded Leakage Resilience