메뉴 건너뛰기




Volumn 5126 LNCS, Issue PART 2, 2008, Pages 511-523

How to protect yourself without perfect shredding

Author keywords

Adaptive security; Forward security; Intrusion resilience; Mobile adversary; Partial erasures; Proactive security; Randomness extractors; Secure multiparty computation; Universal hashing

Indexed keywords

ADAPTIVE SECURITY; CRYPTOGRAPHIC PROTOCOLS; FORWARD SECURITY; INTRUSION RESILIENCE; MOBILE ADVERSARY; PARTIAL ERASURES; PROACTIVE SECURITY; RANDOMNESS EXTRACTORS; REDUNDANT REPRESENTATION; SECRET DATA; SECURE MULTIPARTY COMPUTATION; SECURITY PROPERTIES; STORAGE OVERHEAD; UNIVERSAL HASHING;

EID: 49049102095     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70583-3_42     Document Type: Conference Paper
Times cited : (12)

References (41)
  • 2
    • 84958599141 scopus 로고    scopus 로고
    • Plug and play encryption
    • Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
    • Beaver, D.: Plug and play encryption. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294
    • Beaver, D.1
  • 3
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: Proc. 42nd IEEE Symp. on Foundations of Comp. Science, pp. 136-145 (2001)
    • (2001) Proc. 42nd IEEE Symp. on Foundations of Comp. Science , pp. 136-145
    • Canetti, R.1
  • 4
    • 84948973494 scopus 로고    scopus 로고
    • Exposure-resilient functions and all-or-nothing transforms
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Canetti, R., Dodis, Y., Halevi, S., Kushilevitz, E., Sahai, A.: Exposure-resilient functions and all-or-nothing transforms. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 453-469. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 453-469
    • Canetti, R.1    Dodis, Y.2    Halevi, S.3    Kushilevitz, E.4    Sahai, A.5
  • 7
    • 0013001552 scopus 로고    scopus 로고
    • Proactive security: Long-term protection against break-ins
    • Canetti, R., Gennaro, R., Herzberg, A., Naor, D.: Proactive security: Long-term protection against break-ins. In: CryptoBytes (1) (1999)
    • (1999) CryptoBytes , vol.1
    • Canetti, R.1    Gennaro, R.2    Herzberg, A.3    Naor, D.4
  • 8
    • 0018456171 scopus 로고
    • Universal classes of hash functions
    • Carter, J.L., Wegman, M.N.: Universal classes of hash functions. JCSS 18 (1979)
    • (1979) JCSS , vol.18
    • Carter, J.L.1    Wegman, M.N.2
  • 9
    • 84957086893 scopus 로고    scopus 로고
    • How to forget a secret
    • Meinel, C, Tison, S, eds, STACS 1999, Springer, Heidelberg
    • Di Crescenzo, G., Ferguson, N., Impagliazzo, R., Jakobsson, M.: How to forget a secret. In: Meinel, C., Tison, S. (eds.) STACS 1999. LNCS, vol. 1563, pp. 500-509. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1563 , pp. 500-509
    • Di Crescenzo, G.1    Ferguson, N.2    Impagliazzo, R.3    Jakobsson, M.4
  • 11
  • 14
    • 33745532541 scopus 로고    scopus 로고
    • Intrusion-resilience via the bounded-storage model
    • Dziembowski, S.: Intrusion-resilience via the bounded-storage model. In: Theory of Cryptography Conference, pp. 207-224 (2006)
    • (2006) Theory of Cryptography Conference , pp. 207-224
    • Dziembowski, S.1
  • 15
    • 33749583877 scopus 로고    scopus 로고
    • On forward-secure storage
    • Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
    • Dziembowski, S.: On forward-secure storage. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 251-270. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 251-270
    • Dziembowski, S.1
  • 16
    • 46749096773 scopus 로고    scopus 로고
    • Intrusion-resilient secret sharing
    • Washington, DC, USA, pp, IEEE Computer Society, Los Alamitos
    • Dziembowski, S., Pietrzak, K.: Intrusion-resilient secret sharing. In: FOCS 2007, Washington, DC, USA, pp. 227-237. IEEE Computer Society, Los Alamitos (2007)
    • (2007) FOCS , pp. 227-237
    • Dziembowski, S.1    Pietrzak, K.2
  • 17
    • 84958676203 scopus 로고    scopus 로고
    • Proactive rsa
    • Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
    • Frankel, Y., Gemmel, P., MacKenzie, P.D., Yung, M.: Proactive rsa. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 440-454. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 440-454
    • Frankel, Y.1    Gemmel, P.2    MacKenzie, P.D.3    Yung, M.4
  • 19
    • 84947926543 scopus 로고    scopus 로고
    • Robust threshold Dss signatures
    • Maurer, U.M, ed, EUROCRYPT 1996, Springer, Heidelberg
    • Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Robust threshold Dss signatures. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 354-371. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1070 , pp. 354-371
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 20
    • 1642383295 scopus 로고
    • An identity-based key-exchange protocol
    • Günther, C.G.: An identity-based key-exchange protocol. In: Proc. EUROCRYPT 1989, pp. 29-37 (1989)
    • (1989) Proc. EUROCRYPT , pp. 29-37
    • Günther, C.G.1
  • 21
    • 49049083312 scopus 로고    scopus 로고
    • Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest We Remember: Cold Boot Attacks on Encryption Keys (April 2008), http://citp.princeton.edu/ memory/
    • Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest We Remember: Cold Boot Attacks on Encryption Keys (April 2008), http://citp.princeton.edu/ memory/
  • 23
    • 84957626176 scopus 로고
    • Proactive secret sharing, or: How to cope with perpetual leakage
    • Coppersmith, D, ed, CRYPTO 1995, Springer, Heidelberg
    • Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing, or: How to cope with perpetual leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 339-352. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.963 , pp. 339-352
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 26
    • 0024866111 scopus 로고
    • Pseudo-random generation from one-way functions
    • Impagliazzo, R., Levin, L.A., Luby, M.: Pseudo-random generation from one-way functions. In: STOC 1989, pp. 12-24 (1989)
    • (1989) STOC 1989 , pp. 12-24
    • Impagliazzo, R.1    Levin, L.A.2    Luby, M.3
  • 27
    • 84937422774 scopus 로고    scopus 로고
    • Sibir: Signer-base intrusion-resilient signatures
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Itkis, G., Reyzin, L.: Sibir: Signer-base intrusion-resilient signatures. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 499-514. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 499-514
    • Itkis, G.1    Reyzin, L.2
  • 28
    • 84948968753 scopus 로고    scopus 로고
    • Adaptively secure threshold cryptography: Introducing concurrency, removing erasures
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Jarecki, S., Lysyanskaya, A.: Adaptively secure threshold cryptography: Introducing concurrency, removing erasures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 221-243. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 221-243
    • Jarecki, S.1    Lysyanskaya, A.2
  • 29
    • 26844485031 scopus 로고    scopus 로고
    • Encryption against storage-bounded adversaries from on-line strong extractors
    • Lu, C.-J.: Encryption against storage-bounded adversaries from on-line strong extractors. In: Proc. CRYPTO 2002, pp. 257-271 (2002)
    • (2002) Proc. CRYPTO , pp. 257-271
    • Lu, C.-J.1
  • 32
    • 85043762670 scopus 로고
    • A provably-secure strongly-randomized cipher
    • Damgård, I.B, ed, EUROCRYPT 1990, Springer, Heidelberg
    • Maurer, U.: A provably-secure strongly-randomized cipher. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 361-373. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.473 , pp. 361-373
    • Maurer, U.1
  • 37
    • 84974602942 scopus 로고    scopus 로고
    • Improved non-committing encryption schemes based on a general complexity assumption
    • Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
    • Damgård, I., Nielsen, J.: Improved non-committing encryption schemes based on a general complexity assumption. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880
    • Damgård, I.1    Nielsen, J.2
  • 40
    • 4344628859 scopus 로고    scopus 로고
    • Constructing locally computable extractors and cryptosystems in the bounded-storage model
    • Vadhan, S.P.: Constructing locally computable extractors and cryptosystems in the bounded-storage model. J. Cryptol. 17(1), 43-77 (2004)
    • (2004) J. Cryptol , vol.17 , Issue.1 , pp. 43-77
    • Vadhan, S.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.