Storing Secrets on Continually Leaky Devices
From MaRDI portal
Publication:5495038
DOI10.1109/FOCS.2011.35zbMath1292.94055MaRDI QIDQ5495038
No author found.
Publication date: 30 July 2014
Published in: 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/focs.2011.35
Related Items
On the Connection between Leakage Tolerance and Adaptive Security, Non-malleable Codes with Split-State Refresh, Fully Leakage-Resilient Codes, Continuously non-malleable codes with split-state refresh, Leakage-resilient cryptography from minimal assumptions, Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model, Identity-based broadcast encryption with continuous leakage resilience, Efficient and secure big data storage system with leakage resilience in cloud computing, Hierarchical attribute based encryption with continuous leakage-resilience, Post-challenge leakage in public-key encryption, Leakage resilience from program obfuscation, Fully leakage-resilient signatures, ABE with improved auxiliary input for big data security, Anonymous and leakage resilient IBE and IPE, Threshold public key encryption scheme resilient against continual leakage without random oracles, Leakage-Resilient Functional Encryption via Pair Encodings, Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency, How to Compute in the Presence of Leakage