Leakage-resilient cryptography

S Dziembowski, K Pietrzak - 2008 49th Annual IEEE …, 2008 - ieeexplore.ieee.org
We construct a stream-cipher S whose implementation is secure even if a bounded amount
of arbitrary (adversarially chosen) information on the internal state ofS is leaked during …

Leakage-resilient public-key cryptography in the bounded-retrieval model

J Alwen, Y Dodis, D Wichs - Advances in Cryptology-CRYPTO 2009: 29th …, 2009 - Springer
We study the design of cryptographic primitives resilient to key-leakage attacks, where an
attacker can repeatedly and adaptively learn information about the secret key, subject only …

A leakage-resilient mode of operation

K Pietrzak - Annual International Conference on the Theory and …, 2009 - Springer
A weak pseudorandom function (wPRF) is a cryptographic primitive similar to–but weaker
than–a pseudorandom function: for wPRFs one only requires that the output is …

Public-key encryption in the bounded-retrieval model

J Alwen, Y Dodis, M Naor, G Segev, S Walfish… - Advances in Cryptology …, 2010 - Springer
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM),
providing security against various forms of adversarial “key leakage” attacks. In this model …

On cryptography with auxiliary input

Y Dodis, YT Kalai, S Lovett - Proceedings of the forty-first annual ACM …, 2009 - dl.acm.org
We study the question of designing cryptographic schemes which are secure even if an
arbitrary function f (sk) of the secret key is leaked, as long as the secret key sk is still …

Position based cryptography

N Chandran, V Goyal, R Moriarty… - Annual International …, 2009 - Springer
We consider what constitutes identities in cryptography. Typical examples include your
name and your social-security number, or your fingerprint/iris-scan, or your address, or your …

Practical leakage-resilient identity-based encryption from simple assumptions

SSM Chow, Y Dodis, Y Rouselakis… - Proceedings of the 17th …, 2010 - dl.acm.org
We design the first Leakage-Resilient Identity-Based Encryption (LR-IBE) systems from static
assumptions in the standard model. We derive these schemes by applying a hash proof …

Achieving leakage resilience through dual system encryption

A Lewko, Y Rouselakis, B Waters - Theory of Cryptography: 8th Theory of …, 2011 - Springer
In this work, we show that strong leakage resilience for cryptosystems with advanced
functionalities can be obtained quite naturally within the methodology of dual system …

Non-malleable secret sharing

V Goyal, A Kumar - Proceedings of the 50th Annual ACM SIGACT …, 2018 - dl.acm.org
A number of works have focused on the setting where an adversary tampers with the shares
of a secret sharing scheme. This includes literature on verifiable secret sharing, algebraic …

Improved non-malleable extractors, non-malleable codes and independent source extractors

X Li - Proceedings of the 49th Annual ACM SIGACT …, 2017 - dl.acm.org
In this paper we give improved constructions of several central objects in the literature of
randomness extraction and tamper-resilient cryptography. Our main results are:(1) An …