On cryptography with auxiliary input
From MaRDI portal
Publication:5172757
DOI10.1145/1536414.1536498zbMath1304.94046OpenAlexW2096290348MaRDI QIDQ5172757
Yael Tauman Kalai, Shachar Lovett, Yevgeniy Dodis
Publication date: 4 February 2015
Published in: Proceedings of the forty-first annual ACM symposium on Theory of computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/1536414.1536498
encryption schemeserror-correcting codesauxiliary informationlearning parity with noiserandomness extractorscode obfuscation
Related Items (50)
Signature schemes secure against hard-to-invert leakage ⋮ Witness authenticating NIZKs and applications ⋮ Fully Homomorphic Encryption with Auxiliary Inputs ⋮ Leakage Resilient One-Way Functions: The Auxiliary-Input Setting ⋮ \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption ⋮ Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience ⋮ Fully leakage-resilient signatures ⋮ Public key encryption resilient to leakage and tampering attacks ⋮ Strong authenticated key exchange with auxiliary inputs ⋮ Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks ⋮ On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages ⋮ Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy ⋮ Leakage Resilience of the Blom’s Key Distribution Scheme ⋮ Towards Proofs of Ownership Beyond Bounded Leakage ⋮ Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions ⋮ Identity-based matchmaking encryption without random oracles ⋮ Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption ⋮ Lockable obfuscation from circularly insecure fully homomorphic encryption ⋮ Instantiability of classical random-oracle-model encryption transforms ⋮ Implicit key-stretching security of encryption schemes ⋮ Provably secure certificate-based encryption with leakage resilience ⋮ Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy ⋮ Leakage-resilient cryptography from puncturable primitives and obfuscation ⋮ Leakage-resilient ring signature schemes ⋮ Solving the learning parity with noise's open question ⋮ On the Connection between Leakage Tolerance and Adaptive Security ⋮ New approach to practical leakage-resilient public-key cryptography ⋮ (In)security of ring-LWE under partial key exposure ⋮ Towards a ring analogue of the leftover hash lemma ⋮ Leakage resilient one-way functions: the auxiliary-input setting ⋮ Reusable fuzzy extractors for low-entropy distributions ⋮ Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model ⋮ Contention in Cryptoland: Obfuscation, Leakage and UCE ⋮ Point-Function Obfuscation: A Framework and Generic Constructions ⋮ Cryptography without (Hardly Any) Secrets ? ⋮ Better security for deterministic public-key encryption: the auxiliary-input setting ⋮ Leakage-resilient biometric-based remote user authentication with fuzzy extractors ⋮ The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free ⋮ Deterministic Public-Key Encryption Under Continual Leakage ⋮ Randomness Leakage in the KEM/DEM Framework ⋮ Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks ⋮ Signatures Resilient to Uninvertible Leakage ⋮ Leakage resilience from program obfuscation ⋮ Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN ⋮ Big-Key Symmetric Encryption: Resisting Key Exfiltration ⋮ On Symmetric Encryption and Point Obfuscation ⋮ Leakage-Resilient Signatures ⋮ Public-Key Encryption Schemes with Auxiliary Inputs ⋮ Strongly leakage resilient authenticated key exchange, revisited ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
This page was built for publication: On cryptography with auxiliary input