Witness Maps and Applications
From MaRDI portal
Publication:5041158
DOI10.1007/978-3-030-45374-9_8zbMath1501.94036OpenAlexW3020967341MaRDI QIDQ5041158
Manoj Prabhakaran, Suvradip Chakraborty, Daniel Wichs
Publication date: 13 October 2022
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-45374-9_8
Related Items (7)
Targeted lossy functions and applications ⋮ Explainable arguments ⋮ A map of witness maps: new definitions and connections ⋮ Cumulatively all-lossy-but-one trapdoor functions from standard assumptions ⋮ Impossibility on tamper-resilient cryptography with uniqueness properties ⋮ (Commit-and-prove) predictable arguments with privacy ⋮ Delegation with updatable unambiguous proofs and PPAD-hardness
Cites Work
- Unnamed Item
- Leakage-resilient cryptography from puncturable primitives and obfuscation
- Learning with Rounding, Revisited
- Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier
- Constrained Pseudorandom Functions and Their Applications
- Fully Leakage-Resilient Signatures with Auxiliary Inputs
- Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- On the Cryptographic Applications of Random Functions (Extended Abstract)
- Signatures Resilient to Continual Leakage on Memory and Computation
- Fully Leakage-Resilient Signatures
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Lossy Trapdoor Functions and Their Applications
- Leakage-Resilient Signatures
- Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Lossy trapdoor functions and their applications
- Signature Schemes with Bounded Leakage Resilience
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- The knowledge complexity of interactive proof-systems
- A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad
- How to use indistinguishability obfuscation
- Advances in Cryptology – CRYPTO 2004
- Functional Signatures and Pseudorandom Functions
- Witness encryption and its applications
- Predictable Arguments of Knowledge
- New Negative Results on Differing-Inputs Obfuscation
- On Signatures of Knowledge
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
- On the importance of eliminating errors in cryptographic computations
This page was built for publication: Witness Maps and Applications