Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Leakage-resilient cryptography
We construct a stream-cipher S whose implementation is secure even if a bounded amount
of arbitrary (adversarially chosen) information on the internal state ofS is leaked during …
of arbitrary (adversarially chosen) information on the internal state ofS is leaked during …
Leakage-resilient public-key cryptography in the bounded-retrieval model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an
attacker can repeatedly and adaptively learn information about the secret key, subject only …
attacker can repeatedly and adaptively learn information about the secret key, subject only …
A leakage-resilient mode of operation
K Pietrzak - Annual International Conference on the Theory and …, 2009 - Springer
A weak pseudorandom function (wPRF) is a cryptographic primitive similar to–but weaker
than–a pseudorandom function: for wPRFs one only requires that the output is …
than–a pseudorandom function: for wPRFs one only requires that the output is …
Public-key encryption in the bounded-retrieval model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM),
providing security against various forms of adversarial “key leakage” attacks. In this model …
providing security against various forms of adversarial “key leakage” attacks. In this model …
On cryptography with auxiliary input
We study the question of designing cryptographic schemes which are secure even if an
arbitrary function f (sk) of the secret key is leaked, as long as the secret key sk is still …
arbitrary function f (sk) of the secret key is leaked, as long as the secret key sk is still …
Position based cryptography
We consider what constitutes identities in cryptography. Typical examples include your
name and your social-security number, or your fingerprint/iris-scan, or your address, or your …
name and your social-security number, or your fingerprint/iris-scan, or your address, or your …
Practical leakage-resilient identity-based encryption from simple assumptions
We design the first Leakage-Resilient Identity-Based Encryption (LR-IBE) systems from static
assumptions in the standard model. We derive these schemes by applying a hash proof …
assumptions in the standard model. We derive these schemes by applying a hash proof …
Achieving leakage resilience through dual system encryption
In this work, we show that strong leakage resilience for cryptosystems with advanced
functionalities can be obtained quite naturally within the methodology of dual system …
functionalities can be obtained quite naturally within the methodology of dual system …
Non-malleable secret sharing
V Goyal, A Kumar - Proceedings of the 50th Annual ACM SIGACT …, 2018 - dl.acm.org
A number of works have focused on the setting where an adversary tampers with the shares
of a secret sharing scheme. This includes literature on verifiable secret sharing, algebraic …
of a secret sharing scheme. This includes literature on verifiable secret sharing, algebraic …
Improved non-malleable extractors, non-malleable codes and independent source extractors
X Li - Proceedings of the 49th Annual ACM SIGACT …, 2017 - dl.acm.org
In this paper we give improved constructions of several central objects in the literature of
randomness extraction and tamper-resilient cryptography. Our main results are:(1) An …
randomness extraction and tamper-resilient cryptography. Our main results are:(1) An …