Leakage-resilient cryptography from puncturable primitives and obfuscation
From MaRDI portal
Publication:1710617
DOI10.1007/978-3-030-03329-3_20zbMath1446.94117OpenAlexW2886037732MaRDI QIDQ1710617
Hong-Sheng Zhou, Yu Chen, Yu Yu Wang
Publication date: 23 January 2019
Full work available at URL: https://doi.org/10.1007/978-3-030-03329-3_20
Related Items
Witness Maps and Applications ⋮ Leakage-resilient cryptography from puncturable primitives and obfuscation
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Probabilistic encryption
- Leakage-resilient cryptography from puncturable primitives and obfuscation
- Regularly lossy functions and applications
- Leakage-Resilient Public-Key Encryption from Obfuscation
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Signatures Resilient to Uninvertible Leakage
- The Magic of ELFs
- Constrained Pseudorandom Functions and Their Applications
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
- A Parallel Repetition Theorem for Leakage Resilience
- Leakage-Tolerant Interactive Protocols
- Identity-Based Encryption Resilient to Continual Auxiliary Leakage
- Publicly Evaluable Pseudorandom Functions and Their Applications
- Barriers in cryptography with weak, correlated and leaky sources
- Achieving Leakage Resilience through Dual System Encryption
- Signatures Resilient to Continual Leakage on Memory and Computation
- After-the-Fact Leakage in Public-Key Encryption
- Fully Leakage-Resilient Signatures
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Short and Stateless Signatures from the RSA Assumption
- Public-Key Encryption Schemes with Auxiliary Inputs
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Lossy trapdoor functions and their applications
- Public-Key Encryption in the Bounded-Retrieval Model
- Adaptive Trapdoor Functions and Chosen-Ciphertext Security
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Efficient Chosen-Ciphertext Security via Extractable Hash Proofs
- Chosen-Ciphertext Security via Correlated Products
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- A Leakage-Resilient Mode of Operation
- Signature Schemes with Bounded Leakage Resilience
- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks
- Overcoming Weak Expectations
- Leakage-Resilient Cryptography from Minimal Assumptions
- Updatable Hash Proof System and Its Applications
- On cryptography with auxiliary input
- Leakage-Resilient Zero Knowledge
- How to use indistinguishability obfuscation
- Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms
- Public-Coin Differing-Inputs Obfuscation and Its Applications
- On the (im)possibility of obfuscating programs
- Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
- Functional Signatures and Pseudorandom Functions
- How to leak on key updates
- New Negative Results on Differing-Inputs Obfuscation
- Public-Key Cryptosystems Resilient to Key Leakage
- On lattices, learning with errors, random linear codes, and cryptography
- Theory of Cryptography