Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Public-Key Encryption in the Bounded-Retrieval Model - MaRDI portal

Public-Key Encryption in the Bounded-Retrieval Model

From MaRDI portal
Publication:3563832

DOI10.1007/978-3-642-13190-5_6zbMath1279.94051OpenAlexW1518187966MaRDI QIDQ3563832

Daniel Wichs, Moni Naor, Joël Alwen, Yevgeniy Dodis, Shabsi Walfish, Gil Segev

Publication date: 1 June 2010

Published in: Advances in Cryptology – EUROCRYPT 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-13190-5_6




Related Items (47)

Static-memory-hard functions, and modeling the cost of space vs. timeThe generic construction of continuous leakage-resilient identity-based cryptosystemsFully Homomorphic Encryption with Auxiliary InputsLeakage-resilient cryptography from minimal assumptionsCrypto Galore!Regular lossy functions and their applications in leakage-resilient cryptographyPractical continuously non-malleable randomness encoders in the random oracle modelAdaptive-secure identity-based inner-product functional encryption and its leakage-resilienceFully leakage-resilient signaturesABE with improved auxiliary input for big data securityPublic key encryption resilient to leakage and tampering attacksIncompressible cryptographyPublic-key encryption for protecting data in cloud system with intelligent agents against side-channel attacksAnonymous and leakage resilient IBE and IPELeakage-resilient identity-based cryptography from minimal assumptionsUpdatable Lossy Trapdoor Functions and Its Application in Continuous LeakageKey continual-leakage resilient broadcast cryptosystem from dual system in broadcast networksLeakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from latticesIBE with incompressible master secret and small identity secretsRate-1 incompressible encryption from standard assumptionsA modular approach to the incompressibility of block-cipher-based AEADsStrong continuous non-malleable encoding schemes with tamper-detectionLeakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled CircuitsLockable obfuscation from circularly insecure fully homomorphic encryptionProvably secure certificate-based encryption with leakage resilienceLeakage-resilient cryptography from puncturable primitives and obfuscationBounded-Retrieval Model with Keys Derived from Private DataKDM security for identity-based encryption: constructions and separationsLeakage-resilient attribute based encryption in prime-order groups via predicate encodingsContinuous leakage-resilient certificate-based signcryption scheme and application in cloud computingPost-challenge leakage in public-key encryptionContinuous leakage-resilient certificate-based encryptionNovel updatable identity-based hash proof system and its applicationsFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelNovel generic construction of leakage-resilient PKE scheme with CCA securityTighter security proofs for GPV-IBE in the quantum random oracle modelNovel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard ModelLeakage-Resilient Hierarchical Identity-Based Encryption with Recipient AnonymityIdentity-based encryption with leakage-amplified chosen-ciphertext attacks securityOne-Round Strong Oblivious Signature-Based EnvelopeDeterministic Public-Key Encryption Under Continual LeakageRate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacksBig-Key Symmetric Encryption: Resisting Key ExfiltrationContinuous leakage-resilient identity-based encryption with leakage amplificationIdentity-based broadcast encryption with continuous leakage resilienceLeakage-resilient key exchange and two-seed extractorsIncompressible encodings






This page was built for publication: Public-Key Encryption in the Bounded-Retrieval Model