Nonmalleable digital lockers and robust fuzzy extractors in the plain model
From MaRDI portal
Publication:6175982
DOI10.1007/978-3-031-22972-5_13zbMath1519.94033OpenAlexW4317928311MaRDI QIDQ6175982
No author found.
Publication date: 21 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-22972-5_13
Cites Work
- Unnamed Item
- An algebraic framework for Diffie-Hellman assumptions
- Obfuscating conjunctions
- A simple obfuscation scheme for pattern-matching with wildcards
- Another step towards realizing random oracles: non-malleable point obfuscation
- Non-uniform bounds in the random-permutation, ideal-cipher, and generic-group models
- Robustly reusable fuzzy extractor from standard assumptions
- Randomness is linear in space
- Reusable fuzzy extractors for low-entropy distributions
- Non-interactive zero-knowledge in pairing-free groups from weaker assumptions
- On perfect correctness in (lockable) obfuscation
- Obfuscated fuzzy Hamming distance and conjunctions from subset product problems
- Same point composable and nonmalleable obfuscated point functions
- Generic constructions of robustly reusable fuzzy extractor
- New techniques for obfuscating conjunctions
- The distinction between fixed and random generators in group-based assumptions
- Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy
- Contention in Cryptoland: Obfuscation, Leakage and UCE
- Obfuscating Conjunctions under Entropic Ring LWE
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Pseudorandomness
- Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
- Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings
- Robust Fuzzy Extractors and Authenticated Key Agreement From Close Secrets
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- The random oracle methodology, revisited
- Obfuscation of Hyperplane Membership
- Indistinguishability Obfuscation from Compact Functional Encryption
- On Strong Simulation and Composable Point Obfuscation
- Non-malleable Obfuscation
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Non-malleable extractors and symmetric key cryptography from weak secrets
- How to use indistinguishability obfuscation
- Advances in Cryptology - EUROCRYPT 2004
- Secure Remote Authentication Using Biometric Data
- On the (im)possibility of obfuscating programs
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
- Obfuscating Point Functions with Multibit Output
- Obfuscation for Evasive Functions
- Code Offset in the Exponent.
This page was built for publication: Nonmalleable digital lockers and robust fuzzy extractors in the plain model