Tamper and Leakage Resilience in the Split-State Model

From MaRDI portal
Publication:2914281

DOI10.1007/978-3-642-32009-5_30zbMath1296.94130OpenAlexW2118629598MaRDI QIDQ2914281

Anna Lysyanskaya, Feng-Hao Liu

Publication date: 25 September 2012

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-32009-5_30




Related Items (40)

Non-malleable codes for bounded parallel-time tamperingAdaptive extractors and their application to leakage resilient secret sharingContinuous NMC secure against permutations and overwrites, with applications to CCA secure commitmentsPractical continuously non-malleable randomness encoders in the random oracle modelAnother step towards realizing random oracles: non-malleable point obfuscationPublic key encryption resilient to leakage and tampering attacksContinuously non-malleable secret sharing for general access structuresInteractive non-malleable codesEfficient RKA-Secure KEM and IBE Schemes Against Invertible FunctionsOn the impossibility of cryptography with tamperable randomness(Nondeterministic) hardness vs. non-malleabilityShort leakage resilient and non-malleable secret sharing schemesLeakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from latticesEfficient Public-Key Cryptography with Bounded Leakage and Tamper ResiliencePublic-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary FunctionsStrong continuous non-malleable encoding schemes with tamper-detectionPractical non-malleable codes from symmetric-key primitives in 2-split-state modelContinuously non-malleable codes against bounded-depth tamperingNon-malleable encryption: simpler, shorter, strongerContinuously non-malleable codes in the split-state modelNonmalleable Extractors and Codes, with Their Many Tampered ExtensionsLimits of a conjecture on a leakage-resilient cryptosystemAffine-evasive sets modulo a primeNon-Malleable Codes from Additive CombinatoricsModeling Random Oracles Under Unpredictable QueriesSubversion-resilient signatures: definitions, constructions and applicationsBounded tamper resilience: how to go beyond the algebraic barrierPost-challenge leakage in public-key encryptionNon-malleable Codes with Split-State RefreshTight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-malleable CodesFully Leakage-Resilient CodesTight upper and lower bounds for leakage-resilient, locally decodable and updatable non-malleable codesContinuously non-malleable codes with split-state refreshFour-state non-malleable codes with explicit constant rateInformation-Theoretic Local Non-malleable Codes and Their ApplicationsOptimal Computational Split-state Non-malleable CodesLocally decodable and updatable non-malleable codes and their applicationsSecurity of hedged Fiat-Shamir signatures under fault attacksImpossibility on tamper-resilient cryptography with uniqueness propertiesNon-malleable secret sharing against bounded joint-tampering attacks in the plain model






This page was built for publication: Tamper and Leakage Resilience in the Split-State Model