Public-Key Cryptosystems Resilient to Key Leakage
From MaRDI portal
Publication:5894761
DOI10.1137/100813464zbMath1273.94355OpenAlexW1982239665MaRDI QIDQ5894761
Publication date: 29 November 2012
Published in: SIAM Journal on Computing (Search for Journal in Brave)
Full work available at URL: https://semanticscholar.org/paper/e3794fabb115c15138eece6af1c7ddb5a03909ab
Related Items (22)
Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing ⋮ Leakage-resilient cryptography from minimal assumptions ⋮ Leakage Resilient One-Way Functions: The Auxiliary-Input Setting ⋮ Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience ⋮ Anonymous IBE, leakage resilience and circular security from new assumptions ⋮ Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority ⋮ Naor-Yung paradigm with shared randomness and applications ⋮ Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks ⋮ Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing ⋮ Threshold public key encryption scheme resilient against continual leakage without random oracles ⋮ Unidirectional updatable encryption and proxy re-encryption from DDH ⋮ Strong continuous non-malleable encoding schemes with tamper-detection ⋮ Reproducible circularly secure bit encryption: applications and realizations ⋮ New bounds on the local leakage resilience of Shamir's secret sharing scheme ⋮ Key-policy attribute-based encryption against continual auxiliary input leakage ⋮ Hierarchical attribute based encryption with continuous leakage-resilience ⋮ Incremental deterministic public-key encryption ⋮ Towards a ring analogue of the leftover hash lemma ⋮ Leakage resilient one-way functions: the auxiliary-input setting ⋮ The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free ⋮ Naor-Yung Paradigm with Shared Randomness and Applications ⋮ Identity-based broadcast encryption with continuous leakage resilience
Uses Software
This page was built for publication: Public-Key Cryptosystems Resilient to Key Leakage