On cryptography with auxiliary input

From MaRDI portal
Publication:5172757

DOI10.1145/1536414.1536498zbMath1304.94046OpenAlexW2096290348MaRDI QIDQ5172757

Yael Tauman Kalai, Shachar Lovett, Yevgeniy Dodis

Publication date: 4 February 2015

Published in: Proceedings of the forty-first annual ACM symposium on Theory of computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/1536414.1536498




Related Items (50)

Signature schemes secure against hard-to-invert leakageWitness authenticating NIZKs and applicationsFully Homomorphic Encryption with Auxiliary InputsLeakage Resilient One-Way Functions: The Auxiliary-Input Setting\textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryptionAdaptive-secure identity-based inner-product functional encryption and its leakage-resilienceFully leakage-resilient signaturesPublic key encryption resilient to leakage and tampering attacksStrong authenticated key exchange with auxiliary inputsPublic-key encryption for protecting data in cloud system with intelligent agents against side-channel attacksOn Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert LeakagesUnifying Leakage Classes: Simulatable Leakage and PseudoentropyLeakage Resilience of the Blom’s Key Distribution SchemeTowards Proofs of Ownership Beyond Bounded LeakageStrongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard AssumptionsIdentity-based matchmaking encryption without random oraclesIdentity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear AssumptionLockable obfuscation from circularly insecure fully homomorphic encryptionInstantiability of classical random-oracle-model encryption transformsImplicit key-stretching security of encryption schemesProvably secure certificate-based encryption with leakage resilienceComputational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropyLeakage-resilient cryptography from puncturable primitives and obfuscationLeakage-resilient ring signature schemesSolving the learning parity with noise's open questionOn the Connection between Leakage Tolerance and Adaptive SecurityNew approach to practical leakage-resilient public-key cryptography(In)security of ring-LWE under partial key exposureTowards a ring analogue of the leftover hash lemmaLeakage resilient one-way functions: the auxiliary-input settingReusable fuzzy extractors for low-entropy distributionsFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelContention in Cryptoland: Obfuscation, Leakage and UCEPoint-Function Obfuscation: A Framework and Generic ConstructionsCryptography without (Hardly Any) Secrets ?Better security for deterministic public-key encryption: the auxiliary-input settingLeakage-resilient biometric-based remote user authentication with fuzzy extractorsThe mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for freeDeterministic Public-Key Encryption Under Continual LeakageRandomness Leakage in the KEM/DEM FrameworkRate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacksSignatures Resilient to Uninvertible LeakageLeakage resilience from program obfuscationCryptography with Auxiliary Input and Trapdoor from Constant-Noise LPNBig-Key Symmetric Encryption: Resisting Key ExfiltrationOn Symmetric Encryption and Point ObfuscationLeakage-Resilient SignaturesPublic-Key Encryption Schemes with Auxiliary InputsStrongly leakage resilient authenticated key exchange, revisitedMode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle




This page was built for publication: On cryptography with auxiliary input