Public-Key Cryptosystems Resilient to Key Leakage

From MaRDI portal
Publication:5895111

DOI10.1007/978-3-642-03356-8_2zbMath1252.94091OpenAlexW1547517307MaRDI QIDQ5895111

Moni Naor, Gil Segev

Publication date: 20 October 2009

Published in: Advances in Cryptology - CRYPTO 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-03356-8_2




Related Items (89)

Witness Maps and ApplicationsEfficient and secure big data storage system with leakage resilience in cloud computingSignature schemes secure against hard-to-invert leakageMemory leakage-resilient secret sharing schemesMind Your Coins: Fully Leakage-Resilient Signatures with Graceful DegradationHow to Compute in the Presence of LeakageTargeted lossy functions and applicationsThe generic construction of continuous leakage-resilient identity-based cryptosystemsFully Homomorphic Encryption with Auxiliary InputsLeakage-resilient cryptography from minimal assumptionsPublic-Key Encryption with Simulation-Based Selective-Opening Security and Compact CiphertextsRegular lossy functions and their applications in leakage-resilient cryptographyLeakage-Resilient Identification Schemes from Zero-Knowledge Proofs of StorageAnother step towards realizing random oracles: non-malleable point obfuscationLeakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation AuthorityFully leakage-resilient signaturesNaor-Yung paradigm with shared randomness and applicationsPublic key encryption resilient to leakage and tampering attacksStrong authenticated key exchange with auxiliary inputsAnonymous and leakage resilient IBE and IPELeakage Resilience of the Blom’s Key Distribution SchemeOn the leakage-resilient key exchangeLeakage-resilient identity-based cryptography from minimal assumptionsUpdatable Lossy Trapdoor Functions and Its Application in Continuous LeakageKey continual-leakage resilient broadcast cryptosystem from dual system in broadcast networksAlmost tight multi-user security under adaptive corruptions \& leakages in the standard modelPublic-key encryption scheme with optimal continuous leakage resilienceStrongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard AssumptionsLeakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from latticesSCALES. MPC with small clients and larger ephemeral serversThe Kernel Matrix Diffie-Hellman AssumptionEfficient Public-Key Cryptography with Bounded Leakage and Tamper ResiliencePublic-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary FunctionsIdentity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear AssumptionLockable obfuscation from circularly insecure fully homomorphic encryptionPractical non-malleable codes from symmetric-key primitives in 2-split-state modelGroup homomorphic encryption: characterizations, impossibility results, and applicationsProvably secure certificate-based encryption with leakage resilienceMore constructions of lossy and correlation-secure trapdoor functionsCircular security is complete for KDM securityUpdatable public key encryption in the standard modelLeakage-resilient cryptography from puncturable primitives and obfuscationLeakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability ObfuscationUnifying leakage models: from probing attacks to noisy leakageLossy Key Encapsulation Mechanism and Its ApplicationsNon-Malleable Codes from Additive CombinatoricsGeneric Fully Simulatable Adaptive Oblivious TransferTamper-Proof Circuits: How to Trade Leakage for Tamper-ResilienceBounded tamper resilience: how to go beyond the algebraic barrierAn algebraic framework for Diffie-Hellman assumptionsLeakage-resilient attribute based encryption in prime-order groups via predicate encodingsOn the Connection between Leakage Tolerance and Adaptive SecurityLeakage-resilient coin tossingPost-challenge leakage in public-key encryptionNon-malleable Codes with Split-State RefreshFully Leakage-Resilient CodesNew approach to practical leakage-resilient public-key cryptographyContinuously non-malleable codes with split-state refreshContinuous leakage-resilient certificate-based encryptionNovel updatable identity-based hash proof system and its applicationsVerifiable Random Functions from Standard AssumptionsMultilinear Maps from ObfuscationFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelOptimal Amplification of Noisy LeakagesNovel generic construction of leakage-resilient PKE scheme with CCA securityNovel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard ModelLeakage-Resilient Hierarchical Identity-Based Encryption with Recipient AnonymityIdentity-based encryption with leakage-amplified chosen-ciphertext attacks securityCCA security and trapdoor functions via key-dependent-message securityBetter security for deterministic public-key encryption: the auxiliary-input settingLeakage-resilient biometric-based remote user authentication with fuzzy extractorsDeterministic Public-Key Encryption Under Continual LeakageRandomness Leakage in the KEM/DEM FrameworkRate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacksLeakage-Resilient Coin TossingNaor-Yung Paradigm with Shared Randomness and ApplicationsSignatures Resilient to Uninvertible LeakageLeakage resilience from program obfuscationThe magic of ELFsOn Constructing Homomorphic Encryption Schemes from Coding TheoryOn Symmetric Encryption and Point ObfuscationLeakage-Resilient SignaturesPublic-Key Encryption Schemes with Auxiliary InputsPublic-Key Cryptographic Primitives Provably as Secure as Subset SumContinuous leakage-resilient identity-based encryption with leakage amplificationStructure-preserving public-key encryption with leakage-resilient CCA securityMode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungleLeakage-resilient key exchange and two-seed extractorsCryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family




This page was built for publication: Public-Key Cryptosystems Resilient to Key Leakage