Public-Key Cryptosystems Resilient to Key Leakage
From MaRDI portal
Publication:5895111
DOI10.1007/978-3-642-03356-8_2zbMath1252.94091OpenAlexW1547517307MaRDI QIDQ5895111
Publication date: 20 October 2009
Published in: Advances in Cryptology - CRYPTO 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-03356-8_2
Related Items (89)
Witness Maps and Applications ⋮ Efficient and secure big data storage system with leakage resilience in cloud computing ⋮ Signature schemes secure against hard-to-invert leakage ⋮ Memory leakage-resilient secret sharing schemes ⋮ Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation ⋮ How to Compute in the Presence of Leakage ⋮ Targeted lossy functions and applications ⋮ The generic construction of continuous leakage-resilient identity-based cryptosystems ⋮ Fully Homomorphic Encryption with Auxiliary Inputs ⋮ Leakage-resilient cryptography from minimal assumptions ⋮ Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts ⋮ Regular lossy functions and their applications in leakage-resilient cryptography ⋮ Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage ⋮ Another step towards realizing random oracles: non-malleable point obfuscation ⋮ Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority ⋮ Fully leakage-resilient signatures ⋮ Naor-Yung paradigm with shared randomness and applications ⋮ Public key encryption resilient to leakage and tampering attacks ⋮ Strong authenticated key exchange with auxiliary inputs ⋮ Anonymous and leakage resilient IBE and IPE ⋮ Leakage Resilience of the Blom’s Key Distribution Scheme ⋮ On the leakage-resilient key exchange ⋮ Leakage-resilient identity-based cryptography from minimal assumptions ⋮ Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage ⋮ Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks ⋮ Almost tight multi-user security under adaptive corruptions \& leakages in the standard model ⋮ Public-key encryption scheme with optimal continuous leakage resilience ⋮ Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions ⋮ Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices ⋮ SCALES. MPC with small clients and larger ephemeral servers ⋮ The Kernel Matrix Diffie-Hellman Assumption ⋮ Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience ⋮ Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions ⋮ Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption ⋮ Lockable obfuscation from circularly insecure fully homomorphic encryption ⋮ Practical non-malleable codes from symmetric-key primitives in 2-split-state model ⋮ Group homomorphic encryption: characterizations, impossibility results, and applications ⋮ Provably secure certificate-based encryption with leakage resilience ⋮ More constructions of lossy and correlation-secure trapdoor functions ⋮ Circular security is complete for KDM security ⋮ Updatable public key encryption in the standard model ⋮ Leakage-resilient cryptography from puncturable primitives and obfuscation ⋮ Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation ⋮ Unifying leakage models: from probing attacks to noisy leakage ⋮ Lossy Key Encapsulation Mechanism and Its Applications ⋮ Non-Malleable Codes from Additive Combinatorics ⋮ Generic Fully Simulatable Adaptive Oblivious Transfer ⋮ Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience ⋮ Bounded tamper resilience: how to go beyond the algebraic barrier ⋮ An algebraic framework for Diffie-Hellman assumptions ⋮ Leakage-resilient attribute based encryption in prime-order groups via predicate encodings ⋮ On the Connection between Leakage Tolerance and Adaptive Security ⋮ Leakage-resilient coin tossing ⋮ Post-challenge leakage in public-key encryption ⋮ Non-malleable Codes with Split-State Refresh ⋮ Fully Leakage-Resilient Codes ⋮ New approach to practical leakage-resilient public-key cryptography ⋮ Continuously non-malleable codes with split-state refresh ⋮ Continuous leakage-resilient certificate-based encryption ⋮ Novel updatable identity-based hash proof system and its applications ⋮ Verifiable Random Functions from Standard Assumptions ⋮ Multilinear Maps from Obfuscation ⋮ Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model ⋮ Optimal Amplification of Noisy Leakages ⋮ Novel generic construction of leakage-resilient PKE scheme with CCA security ⋮ Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model ⋮ Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity ⋮ Identity-based encryption with leakage-amplified chosen-ciphertext attacks security ⋮ CCA security and trapdoor functions via key-dependent-message security ⋮ Better security for deterministic public-key encryption: the auxiliary-input setting ⋮ Leakage-resilient biometric-based remote user authentication with fuzzy extractors ⋮ Deterministic Public-Key Encryption Under Continual Leakage ⋮ Randomness Leakage in the KEM/DEM Framework ⋮ Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks ⋮ Leakage-Resilient Coin Tossing ⋮ Naor-Yung Paradigm with Shared Randomness and Applications ⋮ Signatures Resilient to Uninvertible Leakage ⋮ Leakage resilience from program obfuscation ⋮ The magic of ELFs ⋮ On Constructing Homomorphic Encryption Schemes from Coding Theory ⋮ On Symmetric Encryption and Point Obfuscation ⋮ Leakage-Resilient Signatures ⋮ Public-Key Encryption Schemes with Auxiliary Inputs ⋮ Public-Key Cryptographic Primitives Provably as Secure as Subset Sum ⋮ Continuous leakage-resilient identity-based encryption with leakage amplification ⋮ Structure-preserving public-key encryption with leakage-resilient CCA security ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle ⋮ Leakage-resilient key exchange and two-seed extractors ⋮ Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family
This page was built for publication: Public-Key Cryptosystems Resilient to Key Leakage