Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions
From MaRDI portal
Publication:6108851
DOI10.1007/978-3-319-99136-8_23zbMath1517.94197OpenAlexW2887445776MaRDI QIDQ6108851
Unnamed Author, Unnamed Author
Publication date: 30 June 2023
Published in: Developments in Language Theory (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-99136-8_23
digital signatureleakage-resiliencestrong existential unforgeabilityauxiliary (input) leakagehard-to-invert leakage
Cites Work
- Signatures Resilient to Uninvertible Leakage
- Leakage Resilient IBE and IPE under the DLIN Assumption
- Identity-Based Encryption Resilient to Continual Auxiliary Leakage
- Fully Leakage-Resilient Signatures with Auxiliary Inputs
- Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency
- A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model
- Achieving Leakage Resilience through Dual System Encryption
- Signatures Resilient to Continual Leakage on Memory and Computation
- Fully Leakage-Resilient Signatures
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Public-Key Encryption Schemes with Auxiliary Inputs
- Trapdoors for hard lattices and new cryptographic constructions
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Circular-Secure Encryption from Decision Diffie-Hellman
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Generic Transformation to Strongly Unforgeable Signatures
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
- Signature Schemes with Bounded Leakage Resilience
- Signature Schemes Secure against Hard-to-Invert Leakage
- New Model and Construction of ABE: Achieving Key Resilient-Leakage and Attribute Direct-Revocation
- On cryptography with auxiliary input
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Public-Key Cryptosystems Resilient to Key Leakage
- Public Key Cryptography - PKC 2006
This page was built for publication: Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions