Public-Key Cryptosystems Resilient to Key Leakage

From MaRDI portal
Publication:5894761

DOI10.1137/100813464zbMath1273.94355OpenAlexW1982239665MaRDI QIDQ5894761

Gil Segev, Moni Naor

Publication date: 29 November 2012

Published in: SIAM Journal on Computing (Search for Journal in Brave)

Full work available at URL: https://semanticscholar.org/paper/e3794fabb115c15138eece6af1c7ddb5a03909ab




Related Items (22)

Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairingLeakage-resilient cryptography from minimal assumptionsLeakage Resilient One-Way Functions: The Auxiliary-Input SettingAdaptive-secure identity-based inner-product functional encryption and its leakage-resilienceAnonymous IBE, leakage resilience and circular security from new assumptionsLeakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation AuthorityNaor-Yung paradigm with shared randomness and applicationsPublic-key encryption for protecting data in cloud system with intelligent agents against side-channel attacksLeakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairingThreshold public key encryption scheme resilient against continual leakage without random oraclesUnidirectional updatable encryption and proxy re-encryption from DDHStrong continuous non-malleable encoding schemes with tamper-detectionReproducible circularly secure bit encryption: applications and realizationsNew bounds on the local leakage resilience of Shamir's secret sharing schemeKey-policy attribute-based encryption against continual auxiliary input leakageHierarchical attribute based encryption with continuous leakage-resilienceIncremental deterministic public-key encryptionTowards a ring analogue of the leftover hash lemmaLeakage resilient one-way functions: the auxiliary-input settingThe mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for freeNaor-Yung Paradigm with Shared Randomness and ApplicationsIdentity-based broadcast encryption with continuous leakage resilience


Uses Software



This page was built for publication: Public-Key Cryptosystems Resilient to Key Leakage