Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage
From MaRDI portal
Publication:2953868
DOI10.1007/978-3-319-47422-9_18zbMath1381.94077OpenAlexW2531472153MaRDI QIDQ2953868
Yi Mu, Mingwu Zhang, Sujuan Li, Fu-Tai Zhang
Publication date: 6 January 2017
Published in: Provable Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-47422-9_18
Related Items (1)
Cites Work
- KDM-Security via Homomorphic Smooth Projective Hashing
- Deterministic Public-Key Encryption Under Continual Leakage
- On Continual Leakage of Discrete Log Representations
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Lossy trapdoor functions and their applications
- Public-Key Encryption in the Bounded-Retrieval Model
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Circular-Secure Encryption from Decision Diffie-Hellman
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Public-Key Cryptosystems Resilient to Key Leakage
This page was built for publication: Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage