Disappearing cryptography in the bounded storage model
From MaRDI portal
Publication:2697865
DOI10.1007/978-3-030-90453-1_13OpenAlexW3212983257MaRDI QIDQ2697865
Publication date: 13 April 2023
Full work available at URL: https://doi.org/10.1007/978-3-030-90453-1_13
Related Items (3)
Puncturable signature: a generic construction and instantiations ⋮ Rate-1 incompressible encryption from standard assumptions ⋮ Speak much, remember little: cryptography in the bounded storage model, revisited
Cites Work
- Unnamed Item
- Unnamed Item
- Conditionally-perfect secrecy and a provably-secure randomized cipher
- Secure software leasing
- Fully deniable interactive encryption
- Simple schemes in the bounded storage model
- Attribute-Based Encryption for Circuits from Multilinear Maps
- On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
- On Virtual Grey Box Obfuscation for General Circuits
- Functional Encryption: Definitions and Challenges
- Lower and Upper Bounds for Deniable Public-Key Encryption
- Lossy trapdoor functions and their applications
- One-Time Programs
- How to Time-Stamp a Digital Document
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Fuzzy Identity-Based Encryption
- Policy-Based Signatures
- Witness encryption and its applications
- On Forward-Secure Storage
This page was built for publication: Disappearing cryptography in the bounded storage model