Public-Key Encryption in the Bounded-Retrieval Model
From MaRDI portal
Publication:3563832
DOI10.1007/978-3-642-13190-5_6zbMath1279.94051OpenAlexW1518187966MaRDI QIDQ3563832
Daniel Wichs, Moni Naor, Joël Alwen, Yevgeniy Dodis, Shabsi Walfish, Gil Segev
Publication date: 1 June 2010
Published in: Advances in Cryptology – EUROCRYPT 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-13190-5_6
Related Items (47)
Static-memory-hard functions, and modeling the cost of space vs. time ⋮ The generic construction of continuous leakage-resilient identity-based cryptosystems ⋮ Fully Homomorphic Encryption with Auxiliary Inputs ⋮ Leakage-resilient cryptography from minimal assumptions ⋮ Crypto Galore! ⋮ Regular lossy functions and their applications in leakage-resilient cryptography ⋮ Practical continuously non-malleable randomness encoders in the random oracle model ⋮ Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience ⋮ Fully leakage-resilient signatures ⋮ ABE with improved auxiliary input for big data security ⋮ Public key encryption resilient to leakage and tampering attacks ⋮ Incompressible cryptography ⋮ Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks ⋮ Anonymous and leakage resilient IBE and IPE ⋮ Leakage-resilient identity-based cryptography from minimal assumptions ⋮ Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage ⋮ Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks ⋮ Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices ⋮ IBE with incompressible master secret and small identity secrets ⋮ Rate-1 incompressible encryption from standard assumptions ⋮ A modular approach to the incompressibility of block-cipher-based AEADs ⋮ Strong continuous non-malleable encoding schemes with tamper-detection ⋮ Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits ⋮ Lockable obfuscation from circularly insecure fully homomorphic encryption ⋮ Provably secure certificate-based encryption with leakage resilience ⋮ Leakage-resilient cryptography from puncturable primitives and obfuscation ⋮ Bounded-Retrieval Model with Keys Derived from Private Data ⋮ KDM security for identity-based encryption: constructions and separations ⋮ Leakage-resilient attribute based encryption in prime-order groups via predicate encodings ⋮ Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing ⋮ Post-challenge leakage in public-key encryption ⋮ Continuous leakage-resilient certificate-based encryption ⋮ Novel updatable identity-based hash proof system and its applications ⋮ Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model ⋮ Novel generic construction of leakage-resilient PKE scheme with CCA security ⋮ Tighter security proofs for GPV-IBE in the quantum random oracle model ⋮ Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model ⋮ Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity ⋮ Identity-based encryption with leakage-amplified chosen-ciphertext attacks security ⋮ One-Round Strong Oblivious Signature-Based Envelope ⋮ Deterministic Public-Key Encryption Under Continual Leakage ⋮ Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks ⋮ Big-Key Symmetric Encryption: Resisting Key Exfiltration ⋮ Continuous leakage-resilient identity-based encryption with leakage amplification ⋮ Identity-based broadcast encryption with continuous leakage resilience ⋮ Leakage-resilient key exchange and two-seed extractors ⋮ Incompressible encodings
This page was built for publication: Public-Key Encryption in the Bounded-Retrieval Model