Leakage-Resilient Cryptography from Minimal Assumptions
From MaRDI portal
Publication:4924409
DOI10.1007/978-3-642-38348-9_10zbMath1306.94061OpenAlexW1832187505MaRDI QIDQ4924409
Hoeteck Wee, Adriana López-Alt, Daniel Wichs, Carmit Hazay
Publication date: 31 May 2013
Published in: Advances in Cryptology – EUROCRYPT 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-38348-9_10
Related Items (21)
Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions ⋮ Signature schemes secure against hard-to-invert leakage ⋮ Targeted lossy functions and applications ⋮ The generic construction of continuous leakage-resilient identity-based cryptosystems ⋮ Regular lossy functions and their applications in leakage-resilient cryptography ⋮ A Leakage Resilient MAC ⋮ Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority ⋮ Leakage-resilient identity-based cryptography from minimal assumptions ⋮ A map of witness maps: new definitions and connections ⋮ Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices ⋮ IBE with incompressible master secret and small identity secrets ⋮ Rate-1 incompressible encryption from standard assumptions ⋮ Strong continuous non-malleable encoding schemes with tamper-detection ⋮ Efficient leakage-resilient MACs without idealized assumptions ⋮ Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks ⋮ Leakage-resilient cryptography from puncturable primitives and obfuscation ⋮ Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation ⋮ Deterministic Public-Key Encryption Under Continual Leakage ⋮ Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks ⋮ Leakage resilience from program obfuscation ⋮ Continuous leakage-resilient identity-based encryption with leakage amplification
This page was built for publication: Leakage-Resilient Cryptography from Minimal Assumptions