Cryptography Secure against Related-Key Attacks and Tampering
From MaRDI portal
Publication:3102205
DOI10.1007/978-3-642-25385-0_26zbMath1227.94028OpenAlexW2157980705MaRDI QIDQ3102205
Rachel Miller, David Cash, Mihir Bellare
Publication date: 2 December 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-25385-0_26
Related Items (32)
Relations between robustness and RKA security under public-key encryption ⋮ Non-malleable functions and their applications ⋮ Public-Key Puncturable Encryption: Modular and Compact Constructions ⋮ Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system ⋮ Public key encryption resilient to leakage and tampering attacks ⋮ Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks ⋮ Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions ⋮ Secure Message Authentication Against Related-Key Attack ⋮ The Chaining Lemma and Its Application ⋮ Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge ⋮ Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience ⋮ Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions ⋮ On the related-key attack security of authenticated encryption schemes ⋮ Beyond Uber: instantiating generic groups via PGGs ⋮ Practical non-malleable codes from symmetric-key primitives in 2-split-state model ⋮ Continuously non-malleable codes against bounded-depth tampering ⋮ Robust digital signature revisited ⋮ Continuously non-malleable codes in the split-state model ⋮ How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks ⋮ Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model ⋮ Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications ⋮ Subversion-resilient signatures: definitions, constructions and applications ⋮ Bounded tamper resilience: how to go beyond the algebraic barrier ⋮ Related-key security for pseudorandom functions beyond the linear barrier ⋮ Non-malleable Codes with Split-State Refresh ⋮ Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions ⋮ Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman ⋮ Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions ⋮ Fuzzy Signatures: Relaxing Requirements and a New Construction ⋮ Impossibility on tamper-resilient cryptography with uniqueness properties ⋮ Provably-Secure Remote Memory Attestation for Heap Overflow Protection ⋮ Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE
This page was built for publication: Cryptography Secure against Related-Key Attacks and Tampering