Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Leakage-Resilient Zero Knowledge - MaRDI portal

Leakage-Resilient Zero Knowledge

From MaRDI portal
Publication:5199198

DOI10.1007/978-3-642-22792-9_17zbMath1288.68081OpenAlexW2123073224MaRDI QIDQ5199198

Abhishek Jain, Sanjam Garg, Amit Sahai

Publication date: 12 August 2011

Published in: Advances in Cryptology – CRYPTO 2011 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-22792-9_17




Related Items (22)

Memory leakage-resilient secret sharing schemesConstant-round leakage-resilient zero-knowledge from collision resistanceMind Your Coins: Fully Leakage-Resilient Signatures with Graceful DegradationLeakage-resilient cryptography from minimal assumptionsImpossibility of Black-Box Simulation Against Leakage AttacksFully leakage-resilient signaturesGeneric Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage ResiliencyConstant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent AssumptionA group identification protocol with leakage resilience of secret sharing schemeLeakage Resilience of the Blom’s Key Distribution SchemeStrong continuous non-malleable encoding schemes with tamper-detectionPublic-coin 3-round zero-knowledge from learning with errors and keyless multi-collision-resistant hashLeakage-resilient cryptography from puncturable primitives and obfuscationOn the Connection between Leakage Tolerance and Adaptive SecurityLeakage-resilient coin tossingPost-challenge leakage in public-key encryptionFully Leakage-Resilient CodesFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelUnconditionally secure computation against low-complexity leakageCorrection to: ``Unconditionally secure computation against low-complexity leakageDeterministic Public-Key Encryption Under Continual LeakageLeakage-Resilient Coin Tossing







This page was built for publication: Leakage-Resilient Zero Knowledge