메뉴 건너뛰기




Volumn 7778 LNCS, Issue , 2013, Pages 497-515

On the connection between leakage tolerance and adaptive security

Author keywords

adaptive security; arguments of knowledge; leakage tolerance; simulation based security

Indexed keywords

ADAPTIVE CORRUPTIONS; ADAPTIVE SECURITY; ADAPTIVITY; ARGUMENTS OF KNOWLEDGE; ENCRYPTION PROTOCOLS; INTERACTIVE PROTOCOLS; INTERNAL STATE; KEY PAIRS; LEAKAGE TOLERANCE; LEAKAGE-TOLERANT; MESSAGE SPACE; PROTOCOL EXECUTION; SECRET KEY; SECURE MESSAGE TRANSMISSION; SEMI-ADAPTIVE; SIMULATION-BASED SECURITY;

EID: 84873968328     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-36362-7_30     Document Type: Conference Paper
Times cited : (9)

References (36)
  • 1
    • 57849098189 scopus 로고    scopus 로고
    • Universal arguments and their applications
    • Barak, B., Goldreich, O.: Universal arguments and their applications. SIAM J. Comput. 38(5), 1661-1694 (2008)
    • (2008) SIAM J. Comput. , vol.38 , Issue.5 , pp. 1661-1694
    • Barak, B.1    Goldreich, O.2
  • 2
    • 84983104598 scopus 로고
    • On Defining Proofs of Knowledge
    • Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
    • Bellare, M., Goldreich, O.: On Defining Proofs of Knowledge. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 390-420. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740 , pp. 390-420
    • Bellare, M.1    Goldreich, O.2
  • 4
    • 84856494511 scopus 로고    scopus 로고
    • From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again
    • Bitansky, N., Canetti, R., Chiesa, A., Tromer, E.: From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. In: ITCS, pp. 326-349 (2012)
    • (2012) ITCS , pp. 326-349
    • Bitansky, N.1    Canetti, R.2    Chiesa, A.3    Tromer, E.4
  • 5
    • 84858329133 scopus 로고    scopus 로고
    • Leakage-Tolerant Interactive Protocols
    • Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
    • Bitansky, N., Canetti, R., Halevi, S.: Leakage-Tolerant Interactive Protocols. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 266-284. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7194 , pp. 266-284
    • Bitansky, N.1    Canetti, R.2    Halevi, S.3
  • 6
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136-145 (2001)
    • (2001) FOCS , pp. 136-145
    • Canetti, R.1
  • 7
    • 0029723583 scopus 로고    scopus 로고
    • Adaptively secure multi-party computation
    • Canetti, R., Feige, U., Goldreich, O., Naor, M.: Adaptively secure multi-party computation. In: STOC, pp. 639-648 (1996)
    • (1996) STOC , pp. 639-648
    • Canetti, R.1    Feige, U.2    Goldreich, O.3    Naor, M.4
  • 8
    • 77958056591 scopus 로고    scopus 로고
    • Leakage-Resilient Storage
    • Garay, J.A.,De Prisco, R. (eds.) SCN 2010. Springer, Heidelberg
    • Daví, F., Dziembowski, S., Venturi, D.: Leakage-Resilient Storage. In: Garay, J.A.,De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 121-137. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6280 , pp. 121-137
    • Daví, F.1    Dziembowski, S.2    Venturi, D.3
  • 9
    • 78650817944 scopus 로고    scopus 로고
    • Efficient Public-Key Cryptography in the Presence of Key Leakage
    • Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg
    • Dodis, Y., Haralambiev, K., López-Alt, A., Wichs, D.: Efficient Public-Key Cryptography in the Presence of Key Leakage. In: Abe, M. (ed.) ASIACRYPT 2010.LNCS, vol. 6477, pp. 613-631. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6477 , pp. 613-631
    • Dodis, Y.1    Haralambiev, K.2    López-Alt, A.3    Wichs, D.4
  • 10
    • 70350674336 scopus 로고    scopus 로고
    • On cryptography with auxiliary input
    • Dodis, Y., Kalai, Y.T., Lovett, S.: On cryptography with auxiliary input. In: STOC, pp. 621-630 (2009)
    • (2009) STOC , pp. 621-630
    • Dodis, Y.1    Kalai, Y.T.2    Lovett, S.3
  • 11
    • 84863311631 scopus 로고    scopus 로고
    • Storing secrets on continually leaky devices
    • Dodis, Y., Lewko, A.B., Waters, B., Wichs, D.: Storing secrets on continually leaky devices. In: FOCS, pp. 688-697 (2011)
    • (2011) FOCS , pp. 688-697
    • Dodis, Y.1    Lewko, A.B.2    Waters, B.3    Wichs, D.4
  • 12
    • 82955173781 scopus 로고    scopus 로고
    • Leakage-Resilient Cryptography from the Inner-Product Extractor
    • Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. Springer, Heidelberg
    • Dziembowski, S., Faust, S.: Leakage-Resilient Cryptography from the Inner-Product Extractor. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 702-721. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.7073 , pp. 702-721
    • Dziembowski, S.1    Faust, S.2
  • 13
    • 84858320781 scopus 로고    scopus 로고
    • Leakage-Resilient Circuits without Computational Assumptions
    • Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
    • Dziembowski, S., Faust, S.: Leakage-Resilient Circuits without Computational Assumptions. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 230-247. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7194 , pp. 230-247
    • Dziembowski, S.1    Faust, S.2
  • 14
    • 57949107348 scopus 로고    scopus 로고
    • Leakage-resilient cryptography
    • Dziembowski, S., Pietrzak, K.: Leakage-resilient cryptography. In: FOCS, pp. 293-302 (2008)
    • (2008) FOCS , pp. 293-302
    • Dziembowski, S.1    Pietrzak, K.2
  • 15
    • 77949631657 scopus 로고    scopus 로고
    • Leakage-Resilient Signatures
    • Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
    • Faust, S., Kiltz, E., Pietrzak, K., Rothblum, G.N.: Leakage-Resilient Signatures. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 343-360. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5978 , pp. 343-360
    • Faust, S.1    Kiltz, E.2    Pietrzak, K.3    Rothblum, G.N.4
  • 16
    • 77954640094 scopus 로고    scopus 로고
    • Protecting Circuits from Leakage: The Computationally-Bounded and Noisy Cases
    • Gilbert,H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Faust, S., Rabin, T., Reyzin, L., Tromer, E., Vaikuntanathan, V.: Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases. In: Gilbert,H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 135-156. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 135-156
    • Faust, S.1    Rabin, T.2    Reyzin, L.3    Tromer, E.4    Vaikuntanathan, V.5
  • 17
    • 84990731886 scopus 로고
    • How to Prove Yourself: Practical Solutions to Identification and Signature Problems
    • Odlyzko, A.M. (ed.) CRYPTO 1986. Springer, Heidelberg
    • Fiat, A., Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263,pp. 186-194. Springer, Heidelberg (1987)
    • (1987) LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 18
    • 80051976331 scopus 로고    scopus 로고
    • Leakage-Resilient Zero Knowledge
    • Rogaway, P.(ed.) CRYPTO 2011. Springer, Heidelberg
    • Garg, S., Jain, A., Sahai, A.: Leakage-Resilient Zero Knowledge. In: Rogaway, P.(ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 297-315. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6841 , pp. 297-315
    • Garg, S.1    Jain, A.2    Sahai, A.3
  • 19
    • 79959724747 scopus 로고    scopus 로고
    • Separating succinct non-interactive arguments from all falsifiable assumptions
    • Gentry, C., Wichs, D.: Separating succinct non-interactive arguments from all falsifiable assumptions. In: STOC, pp. 99-108 (2011)
    • (2011) STOC , pp. 99-108
    • Gentry, C.1    Wichs, D.2
  • 20
    • 79953188688 scopus 로고    scopus 로고
    • After-the-Fact Leakage in Public-Key Encryption
    • Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
    • Halevi, S., Lin, H.: After-the-Fact Leakage in Public-Key Encryption. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 107-124. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6597 , pp. 107-124
    • Halevi, S.1    Lin, H.2
  • 21
    • 40249089887 scopus 로고    scopus 로고
    • On Seed-Incompressible Functions
    • Canetti,R. (ed.) TCC 2008. Springer, Heidelberg
    • Halevi, S., Myers, S., Rackoff, C.: On Seed-Incompressible Functions. In: Canetti,R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 19-36. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4948 , pp. 19-36
    • Halevi, S.1    Myers, S.2    Rackoff, C.3
  • 22
    • 35248830337 scopus 로고    scopus 로고
    • Private Circuits: Securing Hardware against Probing Attacks
    • Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
    • Ishai, Y., Sahai, A.,Wagner, D.: Private Circuits: Securing Hardware against Probing Attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463-481. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 463-481
    • Ishai, Y.1    Sahai, A.2    Wagner, D.3
  • 23
    • 79953226987 scopus 로고    scopus 로고
    • Parallel Repetition for Leakage Resilience Amplification Revisited
    • Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
    • Jain, A., Pietrzak, K.: Parallel Repetition for Leakage Resilience Amplification Revisited. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 58-69. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6597 , pp. 58-69
    • Jain, A.1    Pietrzak, K.2
  • 24
    • 72449205531 scopus 로고    scopus 로고
    • Signature Schemes with Bounded Leakage Resilience
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Katz, J., Vaikuntanathan, V.: Signature Schemes with Bounded Leakage Resilience.In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 703-720. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 703-720
    • Katz, J.1    Vaikuntanathan, V.2
  • 25
    • 0026963441 scopus 로고
    • A note on efficient zero-knowledge proofs and arguments
    • extended abstract
    • Kilian, J.: A note on efficient zero-knowledge proofs and arguments (extended abstract). In: STOC, pp. 723-732 (1992)
    • (1992) STOC , pp. 723-732
    • Kilian, J.1
  • 26
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • Koblitz, N. (ed.) CRYPTO 1996. Springer, Heidelberg
    • Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp.104-113. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 27
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
    • Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 28
    • 0034854953 scopus 로고    scopus 로고
    • Computationally sound proofs
    • Micali, S.: Computationally sound proofs. SIAM J. Comput. 30(4), 1253-1298 (2000)
    • (2000) SIAM J. Comput. , vol.30 , Issue.4 , pp. 1253-1298
    • Micali, S.1
  • 29
    • 35048852134 scopus 로고    scopus 로고
    • Physically Observable Cryptography
    • Extended Abstract Naor, M. (ed.) TCC 2004. Springer, Heidelberg
    • Micali, S., Reyzin, L.: Physically Observable Cryptography (Extended Abstract). In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 278-296. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2951 , pp. 278-296
    • Micali, S.1    Reyzin, L.2
  • 31
    • 84937420653 scopus 로고    scopus 로고
    • Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case
    • Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
    • Nielsen, J.B.: Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case. In: Yung, M. (ed.) CRYPTO 2002.LNCS, vol. 2442, pp. 111-126. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 111-126
    • Nielsen, J.B.1
  • 32
    • 67650675583 scopus 로고    scopus 로고
    • A Leakage-Resilient Mode of Operation
    • Joux, A. (ed.) EUROCRYPT2009. Springer, Heidelberg
    • Pietrzak, K.: A Leakage-Resilient Mode of Operation. In: Joux, A. (ed.) EUROCRYPT2009. LNCS, vol. 5479, pp. 462-482. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 462-482
    • Pietrzak, K.1
  • 33
    • 84855444381 scopus 로고    scopus 로고
    • Parallel repetition of computationally sound protocols revisited
    • Pietrzak, K., Wikstrom, D.: Parallel repetition of computationally sound protocols revisited. J. Cryptology 25 (1), 116-135 (2012)
    • (2012) J. Cryptology , vol.25 , Issue.1 , pp. 116-135
    • Pietrzak, K.1    Wikstrom, D.2
  • 34
    • 78650238574 scopus 로고    scopus 로고
    • ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards
    • Attali, S., Jensen, T. (eds.) E-smart 2001. Springer, Heidelberg
    • Quisquater, J.-J., Samyde, D.: ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001.LNCS, vol. 2140, pp. 200-210. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2140 , pp. 200-210
    • Quisquater, J.-J.1    Samyde, D.2
  • 35
    • 84859959109 scopus 로고    scopus 로고
    • Quantum Proofs of Knowledge
    • Pointcheval, D., Johansson, T. (eds.)EUROCRYPT 2012. Springer, Heidelberg
    • Unruh, D.: Quantum Proofs of Knowledge. In: Pointcheval, D., Johansson, T. (eds.)EUROCRYPT 2012. LNCS, vol. 7237, pp. 135-152. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7237 , pp. 135-152
    • Unruh, D.1
  • 36
    • 26444588107 scopus 로고    scopus 로고
    • On Round-Efficient Argument Systems
    • Caires, L., Italiano, G.F.,Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. Springer, Heidelberg
    • Wee, H.: On Round-Efficient Argument Systems. In: Caires, L., Italiano, G.F.,Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp.140-152. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3580 , pp. 140-152
    • Wee, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.