Non-malleable extractors and symmetric key cryptography from weak secrets
From MaRDI portal
Publication:5172755
DOI10.1145/1536414.1536496zbMath1304.94048OpenAlexW2140805804MaRDI QIDQ5172755
Publication date: 4 February 2015
Published in: Proceedings of the forty-first annual ACM symposium on Theory of computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/1536414.1536496
authenticationencryptioninformation-theoretic securityauthenticated key agreementrandomness extractorsbounded retrieval modelprivacy amplificationinformation reconcilliation
Related Items (24)
Constructing locally leakage-resilient linear secret-sharing schemes ⋮ LWE without modular reduction and improved side-channel attacks against BLISS ⋮ Local Correlation Breakers and Applications to Three-Source Extractors and Mergers ⋮ Interactive non-malleable codes ⋮ Privacy amplification from non-malleable codes ⋮ Wireless-channel key exchange ⋮ Algebraic restriction codes and their applications ⋮ Extractors: low entropy requirements colliding with non-malleability ⋮ A new approach to efficient non-malleable zero-knowledge ⋮ Nonmalleable digital lockers and robust fuzzy extractors in the plain model ⋮ Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy ⋮ Robustly reusable fuzzy extractor from standard assumptions ⋮ Nonmalleable Extractors and Codes, with Their Many Tampered Extensions ⋮ Computational fuzzy extractors ⋮ Non-Malleable Codes from Additive Combinatorics ⋮ Non-malleable coding against bit-wise and split-state tampering ⋮ Privacy amplification with asymptotically optimal entropy loss ⋮ Unnamed Item ⋮ A unified approach to deterministic encryption: new constructions and a connection to computational entropy ⋮ Low error efficient computational extractors in the CRS model ⋮ Unnamed Item ⋮ Explicit two-source extractors and resilient functions ⋮ Additive Combinatorics: With a View Towards Computer Science and Cryptography—An Exposition ⋮ Non-malleability against polynomial tampering
This page was built for publication: Non-malleable extractors and symmetric key cryptography from weak secrets