메뉴 건너뛰기




Volumn 4117 LNCS, Issue , 2006, Pages 251-270

On forward-secure storage

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER VIRUSES; CRYPTOGRAPHY; DATA COMPRESSION; INFORMATION TECHNOLOGY; MATHEMATICAL MODELS; STORAGE ALLOCATION (COMPUTER);

EID: 33749583877     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11818175_15     Document Type: Conference Paper
Times cited : (27)

References (28)
  • 4
    • 84958598231 scopus 로고    scopus 로고
    • Unconditional security against memory-bounded adversaries
    • CRYPTO'97, Springer
    • C. Cachin and U. Maurer. Unconditional security against memory-bounded adversaries. In CRYPTO'97, volume 1294 of LNCS, pages 292-306. Springer, 1997.
    • (1997) LNCS , vol.1294 , pp. 292-306
    • Cachin, C.1    Maurer, U.2
  • 5
    • 84941155146 scopus 로고    scopus 로고
    • Intrusionresilient authentication in the Limited Communication Model
    • Report 2005/409
    • D. Cash, Y. Z. Ding, Y. Dodis, W. Lee, R. Lipton, and S. Walfish. Intrusionresilient authentication in the Limited Communication Model. Cryptology ePrint Archive, Report 2005/409, 2005. http://eprint.iacr.org/.
    • (2005) Cryptology ePrint Archive
    • Cash, D.1    Ding, Y.Z.2    Dodis, Y.3    Lee, W.4    Lipton, R.5    Walfish, S.6
  • 7
    • 33745629609 scopus 로고    scopus 로고
    • Perfectly secure password protocols in the Bounded Retrieval Model
    • Theory of Cryptography Conference'06. Springer
    • G. Di Crescenzo, R. J. Lipton, and S. Walfish. Perfectly secure password protocols in the Bounded Retrieval Model. In Theory of Cryptography Conference'06, volume 3876 of LNCS, pages 225-244. Springer, 2006.
    • (2006) LNCS , vol.3876 , pp. 225-244
    • Di Crescenzo, G.1    Lipton, R.J.2    Walfish, S.3
  • 8
    • 80051636706 scopus 로고    scopus 로고
    • Single database private information retrieval implies oblivious transfer
    • G. Di Crescenzo, T. Malkin, and R. Ostrovsky. Single Database Private Information Retrieval implies Oblivious Transfer. In EUROCRYPT 2000, pages 122-138, 2000.
    • (2000) EUROCRYPT 2000 , pp. 122-138
    • Di Crescenzo, G.1    Malkin, T.2    Ostrovsky, R.3
  • 10
    • 35048840744 scopus 로고    scopus 로고
    • Constant-round oblivious transfer in the bounded storage model
    • Theory of Cryptography Conference. Springer
    • Y. Z. Ding, D. Harnik, A. Rosen, and R. Shaltiel. Constant-Round Oblivious Transfer in the Bounded Storage Model. In Theory of Cryptography Conference, volume 2951 of LNCS, pages 446-472. Springer, 2004.
    • (2004) LNCS , vol.2951 , pp. 446-472
    • Ding, Y.Z.1    Harnik, D.2    Rosen, A.3    Shaltiel, R.4
  • 11
  • 12
    • 33745532541 scopus 로고    scopus 로고
    • Intrusion-resilience via the Bounded-Storage Model
    • Theory of Cryptography Conference. Springer
    • S. Dziembowski. Intrusion-resilience via the Bounded-Storage Model. In Theory of Cryptography Conference, volume 3876 of LNCS, pages 207-224. Springer, 2006.
    • (2006) LNCS , vol.3876 , pp. 207-224
    • Dziembowski, S.1
  • 14
    • 35048832981 scopus 로고    scopus 로고
    • On generating the initial key in the Bounded-Storage Model
    • In EUROCRYPT '04. Springer
    • S. Dziembowski and U. Maurer. On generating the initial key in the Bounded-Storage Model. In EUROCRYPT '04, volume 3027 of LNCS, pages 126-137. Springer, 2004.
    • (2004) LNCS , vol.3027 , pp. 126-137
    • Dziembowski, S.1    Maurer, U.2
  • 15
    • 4344699394 scopus 로고    scopus 로고
    • Optimal randomizer efficiency in the Bounded-Storage Model
    • January
    • S. Dziembowski and U. Maurer. Optimal randomizer efficiency in the Bounded-Storage Model. Journal of Cryptology, 17(1):5-26, January 2004.
    • (2004) Journal of Cryptology , vol.17 , Issue.1 , pp. 5-26
    • Dziembowski, S.1    Maurer, U.2
  • 16
    • 33749556115 scopus 로고    scopus 로고
    • On the compressibility of NP instances and cryptographic applications
    • Report TR06-022
    • D. Harnik and M. Naor. On the compressibility of NP instances and cryptographic applications. Electronic Colloquium on Computational Complexity, Report TR06-022, 2006.
    • (2006) Electronic Colloquium on Computational Complexity
    • Harnik, D.1    Naor, M.2
  • 18
    • 0345253860 scopus 로고    scopus 로고
    • A pseudorandom generator from any one-way function
    • J. Håstad, R. Impagliazzo, L. A. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM J. Comput., 28(4):1364-1396, 1999.
    • (1999) SIAM J. Comput. , vol.28 , Issue.4 , pp. 1364-1396
    • Håstad, J.1    Impagliazzo, R.2    Levin, L.A.3    Luby, M.4
  • 22
    • 84948954750 scopus 로고    scopus 로고
    • One-way trapdoor permutations are sufficient for non-trivial single-server Private Information Retrieval
    • E. Kushilevitz and R. Ostrovsky. One-way trapdoor permutations are sufficient for non-trivial single-server Private Information Retrieval. In EUROCRYPT, pages 104-121, 2000.
    • (2000) EUROCRYPT , pp. 104-121
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 23
    • 4344636292 scopus 로고    scopus 로고
    • Encryption against storage-bounded adversaries from on-line strong extractors
    • January
    • C.-J. Lu. Encryption against storage-bounded adversaries from on-line strong extractors. Journal of Cryptology, 17(1):27-42, January 2004.
    • (2004) Journal of Cryptology , vol.17 , Issue.1 , pp. 27-42
    • Lu, C.-J.1
  • 24
    • 0026698501 scopus 로고
    • Conditionally-perfect secrecy and a provably-secure randomized cipher
    • U. Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology, 5(1):53-66, 1992.
    • (1992) Journal of Cryptology , vol.5 , Issue.1 , pp. 53-66
    • Maurer, U.1
  • 25
    • 35048857905 scopus 로고    scopus 로고
    • Non-interactive timestamping in the Bounded Storage Model
    • CRYPTO 2004. Springer
    • T. Moran, R. Shaltiel, and A. Ta-Shma. Non-interactive timestamping in the Bounded Storage Model. In CRYPTO 2004, volume 3152 of LNCS, pages 460-476. Springer, 2004.
    • (2004) LNCS , vol.3152 , pp. 460-476
    • Moran, T.1    Shaltiel, R.2    Ta-Shma, A.3
  • 26
    • 33749581172 scopus 로고    scopus 로고
    • Composition implies adaptive security in Minicrypt
    • May
    • K. Pietrzak. Composition implies adaptive security in Minicrypt, May 2006. accepted to EUROCRYPT 2006.
    • (2006) EUROCRYPT 2006
    • Pietrzak, K.1
  • 27
    • 84947912552 scopus 로고    scopus 로고
    • All-or-nothing encryption and the package transform
    • Fast Software Encryption. Springer
    • R. L. Rivest. All-or-nothing encryption and the package transform. In Fast Software Encryption, volume 1267 of LNCS, pages 210-218. Springer, 1997.
    • (1997) LNCS , vol.1267 , pp. 210-218
    • Rivest, R.L.1
  • 28
    • 4344628859 scopus 로고    scopus 로고
    • Constructing locally computable extractors and cryptoSystems in the Bounded-Storage Model
    • January
    • S. P. Vadhan. Constructing locally computable extractors and cryptoSystems in the Bounded-Storage Model. Journal of Cryptology, 17(1):43-77, January 2004.
    • (2004) Journal of Cryptology , vol.17 , Issue.1 , pp. 43-77
    • Vadhan, S.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.