Leakage-Resilient Cryptography from Minimal Assumptions

From MaRDI portal
Publication:4924409

DOI10.1007/978-3-642-38348-9_10zbMath1306.94061OpenAlexW1832187505MaRDI QIDQ4924409

Hoeteck Wee, Adriana López-Alt, Daniel Wichs, Carmit Hazay

Publication date: 31 May 2013

Published in: Advances in Cryptology – EUROCRYPT 2013 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-38348-9_10




Related Items (21)

Strong Authenticity with Leakage Under Weak and Falsifiable Physical AssumptionsSignature schemes secure against hard-to-invert leakageTargeted lossy functions and applicationsThe generic construction of continuous leakage-resilient identity-based cryptosystemsRegular lossy functions and their applications in leakage-resilient cryptographyA Leakage Resilient MACLeakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation AuthorityLeakage-resilient identity-based cryptography from minimal assumptionsA map of witness maps: new definitions and connectionsLeakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from latticesIBE with incompressible master secret and small identity secretsRate-1 incompressible encryption from standard assumptionsStrong continuous non-malleable encoding schemes with tamper-detectionEfficient leakage-resilient MACs without idealized assumptionsConstructions Secure Against Receiver Selective Opening and Chosen Ciphertext AttacksLeakage-resilient cryptography from puncturable primitives and obfuscationLeakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability ObfuscationDeterministic Public-Key Encryption Under Continual LeakageRate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacksLeakage resilience from program obfuscationContinuous leakage-resilient identity-based encryption with leakage amplification




This page was built for publication: Leakage-Resilient Cryptography from Minimal Assumptions