Everlasting security in the bounded storage model
From MaRDI portal
Publication:4674532
DOI10.1109/TIT.2002.1003845zbMATH Open1061.94045OpenAlexW2133817484MaRDI QIDQ4674532FDOQ4674532
Authors: Yonatan Aumann, Yan Zong Ding, Michael O. Rabin
Publication date: 11 May 2005
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/tit.2002.1003845
Recommendations
Cited In (28)
- Random oracles and non-uniformity
- Speak much, remember little: cryptography in the bounded storage model, revisited
- Everlasting multi-party computation
- Simple schemes in the bounded storage model
- Fine-grained cryptography revisited
- Long term confidentiality: a survey
- Advances in Cryptology - EUROCRYPT 2004
- Title not available (Why is that?)
- On Everlasting Security in the Hybrid Bounded Storage Model
- The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
- Title not available (Why is that?)
- Separating adaptive streaming from oblivious streaming using the bounded storage model
- Big-key symmetric encryption: resisting key exfiltration
- Bit commitment in the bounded storage model: tight bound and simple optimal construction
- Theory of Cryptography
- Non-interactive timestamping in the bounded-storage model
- Secure multiparty computation in the bounded storage model
- Title not available (Why is that?)
- Encryption against storage-bounded adversaries from on-line strong extractors
- Title not available (Why is that?)
- Innovative approaches for security of small artefacts
- Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker
- Secure identification and QKD in the bounded-quantum-storage model
- Authentication in the bounded storage model
- An everlasting secure non-interactive timestamping scheme in the bounded storage model
- Memory-sample lower bounds for learning with classical-quantum hybrid memory
- Disappearing cryptography in the bounded storage model
- Everlasting multi-party computation
This page was built for publication: Everlasting security in the bounded storage model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4674532)