Everlasting security in the bounded storage model
From MaRDI portal
Publication:4674532
DOI10.1109/TIT.2002.1003845zbMath1061.94045OpenAlexW2133817484MaRDI QIDQ4674532
Yan Zong Ding, Michael O. Rabin, Yonatan Aumann
Publication date: 11 May 2005
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/tit.2002.1003845
Related Items (15)
Separating adaptive streaming from oblivious streaming using the bounded storage model ⋮ Secure multiparty computation in the bounded storage model ⋮ Random oracles and non-uniformity ⋮ Authentication in the bounded storage model ⋮ Speak much, remember little: cryptography in the bounded storage model, revisited ⋮ Unnamed Item ⋮ Long term confidentiality: a survey ⋮ Innovative approaches for security of small artefacts ⋮ Secure identification and QKD in the bounded-quantum-storage model ⋮ Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker ⋮ Fine-grained cryptography revisited ⋮ Non-interactive timestamping in the bounded-storage model ⋮ Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal Construction ⋮ Big-Key Symmetric Encryption: Resisting Key Exfiltration ⋮ An Everlasting Secure Non-interactive Timestamping Scheme in the Bounded Storage Model
This page was built for publication: Everlasting security in the bounded storage model