Multiparty computation secure against continual memory leakage
From MaRDI portal
Publication:5415547
DOI10.1145/2213977.2214087zbMath1286.94060OpenAlexW2060624942MaRDI QIDQ5415547
Elette Boyle, Abhishek Jain, Yael Tauman Kalai
Publication date: 13 May 2014
Published in: Proceedings of the forty-fourth annual ACM symposium on Theory of computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/2213977.2214087
Related Items (17)
Memory leakage-resilient secret sharing schemes ⋮ Constant-round leakage-resilient zero-knowledge from collision resistance ⋮ How to Compute in the Presence of Leakage ⋮ Leakage Resilient One-Way Functions: The Auxiliary-Input Setting ⋮ Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption ⋮ Enabling cloud storage auditing with key-exposure resilience under continual key-leakage ⋮ Provably secure certificate-based encryption with leakage resilience ⋮ Leakage-resilient coin tossing ⋮ Leakage resilient one-way functions: the auxiliary-input setting ⋮ Continuous leakage-resilient certificate-based encryption ⋮ From fairness to full security in multiparty computation ⋮ Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model ⋮ Unconditionally secure computation against low-complexity leakage ⋮ Correction to: ``Unconditionally secure computation against low-complexity leakage ⋮ Leakage-Resilient Functional Encryption via Pair Encodings ⋮ Deterministic Public-Key Encryption Under Continual Leakage ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
This page was built for publication: Multiparty computation secure against continual memory leakage