Pages that link to "Item:Q3408205"
From MaRDI portal
The following pages link to Public-Key Encryption Schemes with Auxiliary Inputs (Q3408205):
Displaying 44 items.
- Signature schemes secure against hard-to-invert leakage (Q290397) (← links)
- Pseudo-free families of finite computational elementary abelian \(p\)-groups (Q524639) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Better security for deterministic public-key encryption: the auxiliary-input setting (Q744600) (← links)
- Identity-based broadcast encryption with continuous leakage resilience (Q781856) (← links)
- Anonymous IBE, leakage resilience and circular security from new assumptions (Q1648813) (← links)
- On the impossibility of cryptography with tamperable randomness (Q1688399) (← links)
- Reproducible circularly secure bit encryption: applications and realizations (Q1698399) (← links)
- Leakage-resilient cryptography from puncturable primitives and obfuscation (Q1710617) (← links)
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings (Q1752551) (← links)
- Leakage resilient one-way functions: the auxiliary-input setting (Q1784737) (← links)
- Functional encryption for cubic polynomials and implementation (Q1981766) (← links)
- (In)security of ring-LWE under partial key exposure (Q2027270) (← links)
- Towards a ring analogue of the leftover hash lemma (Q2027271) (← links)
- Unbounded multi-party computation from learning with errors (Q2056765) (← links)
- Shorter lattice-based zero-knowledge proofs via one-time commitments (Q2061919) (← links)
- Round-optimal verifiable oblivious pseudorandom functions from ideal lattices (Q2061957) (← links)
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle (Q2096492) (← links)
- Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE (Q2096618) (← links)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience (Q2152060) (← links)
- Key-policy attribute-based encryption against continual auxiliary input leakage (Q2200658) (← links)
- Hierarchical attribute based encryption with continuous leakage-resilience (Q2213099) (← links)
- Post-challenge leakage in public-key encryption (Q2257289) (← links)
- Continuous leakage-resilient certificate-based encryption (Q2279532) (← links)
- Fully leakage-resilient signatures (Q2392093) (← links)
- ABE with improved auxiliary input for big data security (Q2402348) (← links)
- Public key encryption resilient to leakage and tampering attacks (Q2402358) (← links)
- Strong authenticated key exchange with auxiliary inputs (Q2402976) (← links)
- Anonymous and leakage resilient IBE and IPE (Q2407713) (← links)
- Limits of a conjecture on a leakage-resilient cryptosystem (Q2445905) (← links)
- Updatable public key encryption in the standard model (Q2697895) (← links)
- On the Hardness of Learning with Rounding over Small Modulus (Q2796126) (← links)
- Signatures Resilient to Uninvertible Leakage (Q2827729) (← links)
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting (Q3179355) (← links)
- Leakage-Resilient Signatures (Q3408204) (← links)
- Fully Homomorphic Encryption with Auxiliary Inputs (Q3454587) (← links)
- Security Against Related Randomness Attacks via Reconstructive Extractors (Q3460096) (← links)
- A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting (Q4605650) (← links)
- PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model (Q5041165) (← links)
- Tighter security proofs for GPV-IBE in the quantum random oracle model (Q5925501) (← links)
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices (Q6544463) (← links)
- Deniable cryptosystems: simpler constructions and achieving leakage resilience (Q6550608) (← links)
- Revocable cryptography from learning with errors (Q6587947) (← links)
- Protecting distributed primitives against leakage: equivocal secret sharing and more (Q6639504) (← links)