Fully leakage-resilient non-malleable identification schemes in the bounded-retrieval model
From MaRDI portal
Publication:1800586
DOI10.1007/978-3-319-22425-1_10zbMath1398.94186OpenAlexW2188579099MaRDI QIDQ1800586
Publication date: 24 October 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-22425-1_10
identification schemesman-in-the-middle attackstagfully leakage-resilientknowledge-of-exponent assumptionleakage attacks
This page was built for publication: Fully leakage-resilient non-malleable identification schemes in the bounded-retrieval model