Leakage-resilient cryptography from minimal assumptions
From MaRDI portal
Publication:4924409
DOI10.1007/978-3-642-38348-9_10zbMATH Open1306.94061OpenAlexW1832187505MaRDI QIDQ4924409FDOQ4924409
Authors: Carmit Hazay, Adriana López-Alt, Hoeteck Wee, Daniel Wichs
Publication date: 31 May 2013
Published in: Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-38348-9_10
Recommendations
Cited In (31)
- Leakage resilience from program obfuscation
- Leakage-Resilient Coin Tossing
- On Provable Security of wPRF-Based Leakage-Resilient Stream Ciphers
- Deterministic Public-Key Encryption Under Continual Leakage
- Signature schemes secure against hard-to-invert leakage
- Strong continuous non-malleable encoding schemes with tamper-detection
- Leakage-resilient IND-CCA KEM from the extractable hash proofs with indistinguishability obfuscation
- Regular lossy functions and their applications in leakage-resilient cryptography
- Targeted lossy functions and applications
- Public-key cryptosystems resilient to key leakage
- Leakage-resilient cryptography from minimal assumptions
- A map of witness maps: new definitions and connections
- Leakage resilient one-way functions: the auxiliary-input setting
- Leakage-resilient identity-based cryptography from minimal assumptions
- New Developments in Leakage-Resilient Cryptography
- Efficient leakage-resilient MACs without idealized assumptions
- The generic construction of continuous leakage-resilient identity-based cryptosystems
- Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks
- Unprovability of leakage-resilient cryptography beyond the information-theoretic limit
- Leakage-resilient cryptography from puncturable primitives and obfuscation
- IBE with incompressible master secret and small identity secrets
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- Fully Leakage-Resilient Codes
- Continuous leakage-resilient identity-based encryption with leakage amplification
- A Leakage Resilient MAC
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
- Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
- Rate-1 incompressible encryption from standard assumptions
- Constructions secure against receiver selective opening and chosen ciphertext attacks
- Strong authenticity with leakage under weak and falsifiable physical assumptions
This page was built for publication: Leakage-resilient cryptography from minimal assumptions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4924409)