Public-Key Cryptosystems Resilient to Key Leakage

From MaRDI portal
Publication:5895111


DOI10.1007/978-3-642-03356-8_2zbMath1252.94091MaRDI QIDQ5895111

Moni Naor, Gil Segev

Publication date: 20 October 2009

Published in: Advances in Cryptology - CRYPTO 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-03356-8_2


94A60: Cryptography


Related Items

Non-Malleable Codes from Additive Combinatorics, On the Connection between Leakage Tolerance and Adaptive Security, Witness Maps and Applications, Memory leakage-resilient secret sharing schemes, Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority, Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model, Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity, Non-malleable Codes with Split-State Refresh, Fully Leakage-Resilient Codes, Continuously non-malleable codes with split-state refresh, CCA security and trapdoor functions via key-dependent-message security, Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family, Leakage-resilient identity-based cryptography from minimal assumptions, Almost tight multi-user security under adaptive corruptions \& leakages in the standard model, Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions, Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices, SCALES. MPC with small clients and larger ephemeral servers, Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption, Lockable obfuscation from circularly insecure fully homomorphic encryption, Practical non-malleable codes from symmetric-key primitives in 2-split-state model, Signature schemes secure against hard-to-invert leakage, Leakage-resilient cryptography from minimal assumptions, Bounded tamper resilience: how to go beyond the algebraic barrier, An algebraic framework for Diffie-Hellman assumptions, Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model, Better security for deterministic public-key encryption: the auxiliary-input setting, Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks, Efficient and secure big data storage system with leakage resilience in cloud computing, Regular lossy functions and their applications in leakage-resilient cryptography, Another step towards realizing random oracles: non-malleable point obfuscation, On the leakage-resilient key exchange, Provably secure certificate-based encryption with leakage resilience, Leakage-resilient cryptography from puncturable primitives and obfuscation, Unifying leakage models: from probing attacks to noisy leakage, Leakage-resilient attribute based encryption in prime-order groups via predicate encodings, Group homomorphic encryption: characterizations, impossibility results, and applications, More constructions of lossy and correlation-secure trapdoor functions, New approach to practical leakage-resilient public-key cryptography, Novel generic construction of leakage-resilient PKE scheme with CCA security, Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks, Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle, Leakage-resilient key exchange and two-seed extractors, Targeted lossy functions and applications, Leakage-resilient coin tossing, Post-challenge leakage in public-key encryption, Continuous leakage-resilient certificate-based encryption, Novel updatable identity-based hash proof system and its applications, Identity-based encryption with leakage-amplified chosen-ciphertext attacks security, Leakage-resilient biometric-based remote user authentication with fuzzy extractors, Leakage resilience from program obfuscation, The magic of ELFs, Continuous leakage-resilient identity-based encryption with leakage amplification, Structure-preserving public-key encryption with leakage-resilient CCA security, Fully leakage-resilient signatures, Naor-Yung paradigm with shared randomness and applications, Public key encryption resilient to leakage and tampering attacks, Strong authenticated key exchange with auxiliary inputs, Anonymous and leakage resilient IBE and IPE, The generic construction of continuous leakage-resilient identity-based cryptosystems, Public-key encryption scheme with optimal continuous leakage resilience, Circular security is complete for KDM security, Updatable public key encryption in the standard model, Verifiable Random Functions from Standard Assumptions, Multilinear Maps from Obfuscation, Optimal Amplification of Noisy Leakages, Deterministic Public-Key Encryption Under Continual Leakage, Naor-Yung Paradigm with Shared Randomness and Applications, Signatures Resilient to Uninvertible Leakage, Leakage Resilience of the Blom’s Key Distribution Scheme, Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage, The Kernel Matrix Diffie-Hellman Assumption, Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience, Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions, Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation, Lossy Key Encapsulation Mechanism and Its Applications, Generic Fully Simulatable Adaptive Oblivious Transfer, Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience, Randomness Leakage in the KEM/DEM Framework, Leakage-Resilient Coin Tossing, On Constructing Homomorphic Encryption Schemes from Coding Theory, Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts, On Symmetric Encryption and Point Obfuscation, Leakage-Resilient Signatures, Public-Key Encryption Schemes with Auxiliary Inputs, Public-Key Cryptographic Primitives Provably as Secure as Subset Sum, Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation, How to Compute in the Presence of Leakage, Fully Homomorphic Encryption with Auxiliary Inputs, Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage