On cryptography with auxiliary input

From MaRDI portal
Publication:5172757


DOI10.1145/1536414.1536498zbMath1304.94046MaRDI QIDQ5172757

Yael Tauman Kalai, Shachar Lovett, Yevgeniy Dodis

Publication date: 4 February 2015

Published in: Proceedings of the forty-first annual ACM symposium on Theory of computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/1536414.1536498


94B05: Linear codes (general theory)

94A60: Cryptography


Related Items

On the Connection between Leakage Tolerance and Adaptive Security, Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions, Identity-based matchmaking encryption without random oracles, Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption, Lockable obfuscation from circularly insecure fully homomorphic encryption, Instantiability of classical random-oracle-model encryption transforms, Implicit key-stretching security of encryption schemes, Signature schemes secure against hard-to-invert leakage, Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model, Better security for deterministic public-key encryption: the auxiliary-input setting, Provably secure certificate-based encryption with leakage resilience, Leakage-resilient cryptography from puncturable primitives and obfuscation, Leakage-resilient ring signature schemes, Leakage resilient one-way functions: the auxiliary-input setting, New approach to practical leakage-resilient public-key cryptography, (In)security of ring-LWE under partial key exposure, Towards a ring analogue of the leftover hash lemma, Reusable fuzzy extractors for low-entropy distributions, The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free, Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks, Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle, Witness authenticating NIZKs and applications, \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption, Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience, Leakage-resilient biometric-based remote user authentication with fuzzy extractors, Leakage resilience from program obfuscation, Strongly leakage resilient authenticated key exchange, revisited, Fully leakage-resilient signatures, Public key encryption resilient to leakage and tampering attacks, Strong authenticated key exchange with auxiliary inputs, Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks, Solving the learning parity with noise's open question, Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy, Contention in Cryptoland: Obfuscation, Leakage and UCE, Point-Function Obfuscation: A Framework and Generic Constructions, Deterministic Public-Key Encryption Under Continual Leakage, Signatures Resilient to Uninvertible Leakage, Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN, Big-Key Symmetric Encryption: Resisting Key Exfiltration, On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages, Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy, Leakage Resilience of the Blom’s Key Distribution Scheme, Towards Proofs of Ownership Beyond Bounded Leakage, Randomness Leakage in the KEM/DEM Framework, Leakage Resilient One-Way Functions: The Auxiliary-Input Setting, On Symmetric Encryption and Point Obfuscation, Leakage-Resilient Signatures, Public-Key Encryption Schemes with Auxiliary Inputs, Fully Homomorphic Encryption with Auxiliary Inputs, Cryptography without (Hardly Any) Secrets ?