Regular lossy functions and their applications in leakage-resilient cryptography
From MaRDI portal
Publication:1643156
DOI10.1016/j.tcs.2018.04.043zbMath1408.94931OpenAlexW2801679666MaRDI QIDQ1643156
Haiyang Xue, Baodong Qin, Yu Chen
Publication date: 18 June 2018
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2018.04.043
one-way functionsmessage authentication codesleakage resiliencehash proof system(identity-based) key encapsulation mechanismregular lossy functions
Related Items (2)
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security ⋮ Continuous leakage-resilient identity-based encryption with leakage amplification
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model
- All-but-many lossy trapdoor functions from lattices and applications
- More constructions of lossy and correlation-secure trapdoor functions
- Instantiability of RSA-OAEP under chosen-plaintext attack
- The Magic of ELFs
- Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- All-But-Many Lossy Trapdoor Functions
- Dual Projective Hashing and Its Applications — Lossy Trapdoor Functions and More
- Extended-DDH and Lossy Trapdoor Functions
- Achieving Leakage Resilience through Dual System Encryption
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Lossy trapdoor functions and their applications
- Trapdoors for hard lattices and new cryptographic constructions
- Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions
- Public-Key Encryption in the Bounded-Retrieval Model
- Adaptive Trapdoor Functions and Chosen-Ciphertext Security
- Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Practical Identity-Based Encryption Without Random Oracles
- Circular-Secure Encryption from Decision Diffie-Hellman
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- Chosen-Ciphertext Security via Correlated Products
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- A New Randomness Extraction Paradigm for Hybrid Encryption
- Signature Schemes with Bounded Leakage Resilience
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks
- Leakage-Resilient Cryptography from Minimal Assumptions
- Circular Chosen-Ciphertext Security with Compact Ciphertexts
- Survey: Leakage Resilience and the Bounded Retrieval Model
- Advances in Cryptology – CRYPTO 2004
- Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
- On the Lossiness of the Rabin Trapdoor Function
- Public-Key Cryptosystems Resilient to Key Leakage
- On lattices, learning with errors, random linear codes, and cryptography
This page was built for publication: Regular lossy functions and their applications in leakage-resilient cryptography