Tamper and Leakage Resilience in the Split-State Model
From MaRDI portal
Publication:2914281
DOI10.1007/978-3-642-32009-5_30zbMath1296.94130OpenAlexW2118629598MaRDI QIDQ2914281
Anna Lysyanskaya, Feng-Hao Liu
Publication date: 25 September 2012
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-32009-5_30
Related Items (40)
Non-malleable codes for bounded parallel-time tampering ⋮ Adaptive extractors and their application to leakage resilient secret sharing ⋮ Continuous NMC secure against permutations and overwrites, with applications to CCA secure commitments ⋮ Practical continuously non-malleable randomness encoders in the random oracle model ⋮ Another step towards realizing random oracles: non-malleable point obfuscation ⋮ Public key encryption resilient to leakage and tampering attacks ⋮ Continuously non-malleable secret sharing for general access structures ⋮ Interactive non-malleable codes ⋮ Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions ⋮ On the impossibility of cryptography with tamperable randomness ⋮ (Nondeterministic) hardness vs. non-malleability ⋮ Short leakage resilient and non-malleable secret sharing schemes ⋮ Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices ⋮ Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience ⋮ Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions ⋮ Strong continuous non-malleable encoding schemes with tamper-detection ⋮ Practical non-malleable codes from symmetric-key primitives in 2-split-state model ⋮ Continuously non-malleable codes against bounded-depth tampering ⋮ Non-malleable encryption: simpler, shorter, stronger ⋮ Continuously non-malleable codes in the split-state model ⋮ Nonmalleable Extractors and Codes, with Their Many Tampered Extensions ⋮ Limits of a conjecture on a leakage-resilient cryptosystem ⋮ Affine-evasive sets modulo a prime ⋮ Non-Malleable Codes from Additive Combinatorics ⋮ Modeling Random Oracles Under Unpredictable Queries ⋮ Subversion-resilient signatures: definitions, constructions and applications ⋮ Bounded tamper resilience: how to go beyond the algebraic barrier ⋮ Post-challenge leakage in public-key encryption ⋮ Non-malleable Codes with Split-State Refresh ⋮ Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-malleable Codes ⋮ Fully Leakage-Resilient Codes ⋮ Tight upper and lower bounds for leakage-resilient, locally decodable and updatable non-malleable codes ⋮ Continuously non-malleable codes with split-state refresh ⋮ Four-state non-malleable codes with explicit constant rate ⋮ Information-Theoretic Local Non-malleable Codes and Their Applications ⋮ Optimal Computational Split-state Non-malleable Codes ⋮ Locally decodable and updatable non-malleable codes and their applications ⋮ Security of hedged Fiat-Shamir signatures under fault attacks ⋮ Impossibility on tamper-resilient cryptography with uniqueness properties ⋮ Non-malleable secret sharing against bounded joint-tampering attacks in the plain model
This page was built for publication: Tamper and Leakage Resilience in the Split-State Model