Signatures Resilient to Uninvertible Leakage
From MaRDI portal
Publication:2827729
DOI10.1007/978-3-319-44618-9_20zbMath1482.94073OpenAlexW2515207446MaRDI QIDQ2827729
Yu Yu Wang, Keisuke Tanaka, Takahiro Matsuda, Goichiro Hanaoka
Publication date: 21 October 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-44618-9_20
Related Items (2)
Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions ⋮ Leakage-resilient cryptography from puncturable primitives and obfuscation
Cites Work
- Unnamed Item
- Unnamed Item
- Advances in cryptology -- EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8--12, 2016. Proceedings. Part II
- Limits of Extractability Assumptions with Distributional Auxiliary Input
- Point-Function Obfuscation: A Framework and Generic Constructions
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption
- Instantiating Random Oracles via UCEs
- Constrained Pseudorandom Functions and Their Applications
- On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
- Point Obfuscation and 3-Round Zero-Knowledge
- Identity-Based Encryption Resilient to Continual Auxiliary Leakage
- Fully Leakage-Resilient Signatures with Auxiliary Inputs
- Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation
- Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input
- Signatures Resilient to Continual Leakage on Memory and Computation
- Fully Leakage-Resilient Signatures
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Public-Key Encryption Schemes with Auxiliary Inputs
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- On obfuscating point functions
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Signature Schemes with Bounded Leakage Resilience
- Signature Schemes Secure against Hard-to-Invert Leakage
- On cryptography with auxiliary input
- How to use indistinguishability obfuscation
- Public-Coin Differing-Inputs Obfuscation and Its Applications
- Advances in Cryptology - EUROCRYPT 2004
- On Extractability Obfuscation
- Public-Key Cryptosystems Resilient to Key Leakage
This page was built for publication: Signatures Resilient to Uninvertible Leakage