Continuous Non-malleable Key Derivation and Its Application to Related-Key Security
From MaRDI portal
Publication:2941210
DOI10.1007/978-3-662-46447-2_25zbMath1345.94085OpenAlexW578938647MaRDI QIDQ2941210
Tsz Hon Yuen, Baodong Qin, Robert H. Deng, Shengli Liu, Ke-Fei Chen
Publication date: 27 August 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46447-2_25
Related Items (15)
Non-malleable functions and their applications ⋮ Public key encryption resilient to leakage and tampering attacks ⋮ Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions ⋮ The Chaining Lemma and Its Application ⋮ Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience ⋮ Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions ⋮ Strong continuous non-malleable encoding schemes with tamper-detection ⋮ Continuously non-malleable codes against bounded-depth tampering ⋮ How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks ⋮ Bounded tamper resilience: how to go beyond the algebraic barrier ⋮ Non-malleable Codes with Split-State Refresh ⋮ Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman ⋮ Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions ⋮ Impossibility on tamper-resilient cryptography with uniqueness properties ⋮ Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE
This page was built for publication: Continuous Non-malleable Key Derivation and Its Application to Related-Key Security