Storing Secrets on Continually Leaky Devices
From MaRDI portal
Publication:5495038
DOI10.1109/FOCS.2011.35zbMath1292.94055OpenAlexW2040690559MaRDI QIDQ5495038
No author found.
Publication date: 30 July 2014
Published in: 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/focs.2011.35
Related Items (18)
Efficient and secure big data storage system with leakage resilience in cloud computing ⋮ How to Compute in the Presence of Leakage ⋮ Leakage-resilient cryptography from minimal assumptions ⋮ Fully leakage-resilient signatures ⋮ Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency ⋮ ABE with improved auxiliary input for big data security ⋮ Anonymous and leakage resilient IBE and IPE ⋮ Threshold public key encryption scheme resilient against continual leakage without random oracles ⋮ Hierarchical attribute based encryption with continuous leakage-resilience ⋮ On the Connection between Leakage Tolerance and Adaptive Security ⋮ Post-challenge leakage in public-key encryption ⋮ Non-malleable Codes with Split-State Refresh ⋮ Fully Leakage-Resilient Codes ⋮ Continuously non-malleable codes with split-state refresh ⋮ Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model ⋮ Leakage-Resilient Functional Encryption via Pair Encodings ⋮ Leakage resilience from program obfuscation ⋮ Identity-based broadcast encryption with continuous leakage resilience
This page was built for publication: Storing Secrets on Continually Leaky Devices