메뉴 건너뛰기




Volumn 9326, Issue , 2015, Pages 266-285

Updatable hash proof system and its applications

Author keywords

[No Author keywords available]

Indexed keywords

PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84951268418     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-24174-6_14     Document Type: Conference Paper
Times cited : (18)

References (36)
  • 1
    • 24944516264 scopus 로고    scopus 로고
    • Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of kurosawa-desmedt KEM
    • In: Cramer, R. (ed.), Springer, Heidelberg
    • Abe, M., Gennaro, R., Kurosawa, K., Shoup, V.: Tag-KEM/DEM: a new framework for hybrid encryption and a new analysis of kurosawa-desmedt KEM. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 128-146. Springer, Heidelberg (2005)
    • (2005) EUROCRYPT 2005. LNCS , vol.3494 , pp. 128-146
    • Abe, M.1    Gennaro, R.2    Kurosawa, K.3    Shoup, V.4
  • 2
    • 70350627587 scopus 로고    scopus 로고
    • Simultaneous hardcore bits and cryptography against memory attacks
    • In: Reingold, O. (ed.), Springer, Heidelberg
    • Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 474-495. Springer, Heidelberg (2009)
    • (2009) TCC 2009. LNCS , vol.5444 , pp. 474-495
    • Akavia, A.1    Goldwasser, S.2    Vaikuntanathan, V.3
  • 3
    • 84958641478 scopus 로고    scopus 로고
    • Differential fault analysis of secret key cryptosystems
    • In: Kaliski Jr., B.S. (ed.), Springer, Heidelberg
    • Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513-525. Springer, Heidelberg (1997)
    • (1997) CRYPTO 1997. LNCS , vol.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 4
    • 78751478860 scopus 로고    scopus 로고
    • Overcoming the hole in the bucket: Public-key cryptography resilient to continual memory leakage
    • IEEE
    • Brakerski, Z., Kalai, Y.T., Katz, J., Vaikuntanathan, V.: Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage. In: FOCS, pp. 501-510.EEE (2010)
    • (2010) FOCS , pp. 501-510
    • Brakerski, Z.1    Kalai, Y.T.2    Katz, J.3    Vaikuntanathan, V.4
  • 5
    • 85032541897 scopus 로고    scopus 로고
    • Remote timing attacks are practical
    • USENIX Association
    • Brumley, D., Boneh, D.: Remote timing attacks are practical. In: USENIX Security Symposium, p. 1. USENIX Association (2003)
    • (2003) USENIX Security Symposium
    • Brumley, D.1    Boneh, D.2
  • 6
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • In: Cachin, C., Camenisch, J.L. (eds.), Springer, Heidelberg
    • Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
    • (2004) EUROCRYPT 2004. LNCS , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 7
    • 84963650728 scopus 로고
    • Universal classes of hash functions
    • ACM
    • Carter, J.L., Wegman, M.N.: Universal classes of hash functions. In: STOC, pp. 106-112. ACM (1977)
    • (1977) STOC , pp. 106-112
    • Carter, J.L.1    Wegman, M.N.2
  • 8
    • 84947267092 scopus 로고    scopus 로고
    • Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
    • In: Knudsen, L.R. (ed.), Springer, Heidelberg
    • Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, p. 45. Springer, Heidelberg (2002)
    • (2002) EUROCRYPT 2002. LNCS , vol.2332
    • Cramer, R.1    Shoup, V.2
  • 9
    • 78751485079 scopus 로고    scopus 로고
    • Cryptography against continuous memory attacks
    • IEEE
    • Dodis, Y., Haralambiev, K., Lopez-Alt, A., Wichs, D.: Cryptography against continuous memory attacks. In: FOCS, pp. 511-520. IEEE (2010)
    • (2010) FOCS , pp. 511-520
    • Dodis, Y.1    Haralambiev, K.2    Lopez-Alt, A.3    Wichs, D.4
  • 10
    • 70350674336 scopus 로고    scopus 로고
    • On cryptography with auxiliary input
    • ACM
    • Dodis, Y., Kalai, Y.T., Lovett, S.: On cryptography with auxiliary input. In: STOC, pp. 621-630. ACM (2009)
    • (2009) STOC , pp. 621-630
    • Dodis, Y.1    Kalai, Y.T.2    Lovett, S.3
  • 11
    • 84863311631 scopus 로고    scopus 로고
    • Storing secrets on continually leaky devices
    • IEEE
    • Dodis, Y., Lewko, A., Waters, B., Wichs, D.: Storing secrets on continually leaky devices. In: FOCS, pp. 688-697. IEEE (2011)
    • (2011) FOCS , pp. 688-697
    • Dodis, Y.1    Lewko, A.2    Waters, B.3    Wichs, D.4
  • 12
    • 77956996186 scopus 로고    scopus 로고
    • Leakage-resilient pseudorandom functions and side-channel attacks on feistel networks
    • In: Rabin, T. (ed.), Springer, Heidelberg
    • Dodis, Y., Pietrzak, K.: Leakage-resilient pseudorandom functions and side-channel attacks on feistel networks. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 21-40. Springer, Heidelberg (2010)
    • (2010) CRYPTO 2010. LNCS , vol.6223 , pp. 21-40
    • Dodis, Y.1    Pietrzak, K.2
  • 13
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • In: Cachin, C., Camenisch, J.L. (eds.), Springer, Heidelberg
    • Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
    • (2004) EUROCRYPT 2004. LNCS , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 14
    • 57949107348 scopus 로고    scopus 로고
    • Leakage-resilient cryptography
    • IEEE
    • Dziembowski, S., Pietrzak, K.: Leakage-resilient cryptography. In: FOCS, pp. 293-302. IEEE (2008)
    • (2008) FOCS , pp. 293-302
    • Dziembowski, S.1    Pietrzak, K.2
  • 15
    • 35248830706 scopus 로고    scopus 로고
    • A framework for password-based authenticated key exchange
    • In: Biham, E. (ed.), Springer, Heidelberg
    • Gennaro, R., Lindell, Y.: A framework for password-based authenticated key exchange. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656. Springer, Heidelberg (2003)
    • (2003) EUROCRYPT 2003. LNCS , pp. 2656
    • Gennaro, R.1    Lindell, Y.2
  • 16
    • 44449140946 scopus 로고    scopus 로고
    • Efficient non-interactive proof systems for bilinear groups
    • In: Smart, N.P. (ed.), Springer, Heidelberg
    • Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415-432. Springer, Heidelberg (2008)
    • (2008) EUROCRYPT 2008. LNCS , vol.4965 , pp. 415-432
    • Groth, J.1    Sahai, A.2
  • 18
    • 84883335633 scopus 로고    scopus 로고
    • Leakage-resilient cryptography from minimal assumptions
    • In: Johansson, T., Nguyen, P.Q. (eds.), Springer, Heidelberg
    • Hazay, C., López-Alt, A., Wee, H., Wichs, D.: Leakage-resilient cryptography from minimal assumptions. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 160-176. Springer, Heidelberg (2013)
    • (2013) EUROCRYPT 2013. LNCS , vol.7881 , pp. 160-176
    • Hazay, C.1    López-Alt, A.2    Wee, H.3    Wichs, D.4
  • 19
    • 84861715771 scopus 로고    scopus 로고
    • Extended-DDH and lossy trapdoor functions
    • In: Fischlin, M., Buchmann, J., Manulis, M. (eds.), Springer, Heidelberg
    • Hemenway, B., Ostrovsky, R.: Extended-DDH and lossy trapdoor functions. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 627-643. Springer, Heidelberg (2012)
    • (2012) PKC 2012. LNCS , vol.7293 , pp. 627-643
    • Hemenway, B.1    Ostrovsky, R.2
  • 20
    • 38049165151 scopus 로고    scopus 로고
    • Secure hybrid encryption from weakened key encapsulation
    • In: Menezes, A. (ed.), Springer, Heidelberg
    • Hofheinz, D., Kiltz, E.: Secure hybrid encryption from weakened key encapsulation. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 553-571. Springer, Heidelberg (2007)
    • (2007) CRYPTO 2007. LNCS , vol.4622 , pp. 553-571
    • Hofheinz, D.1    Kiltz, E.2
  • 21
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • In: Wiener, M. (ed.), Springer, Heidelberg
    • Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, p. 388. Springer, Heidelberg (1999)
    • (1999) CRYPTO 1999. LNCS , vol.1666
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 22
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • In: Koblitz, N. (ed.), Springer, Heidelberg
    • Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
    • (1996) CRYPTO 1996. LNCS , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 23
    • 84951273220 scopus 로고    scopus 로고
    • Deterministic public-key encryption under continual leakage
    • Report 2014/780
    • Koppula, V., Pandey, O., Rouselakis, Y., Waters, B.: Deterministic public-key encryption under continual leakage. Cryptology ePrint Archive, Report 2014/780 (2014). http://eprint.iacr.org/
    • (2014) Cryptology Eprint Archive
    • Koppula, V.1    Pandey, O.2    Rouselakis, Y.3    Waters, B.4
  • 24
    • 35048835796 scopus 로고    scopus 로고
    • A new paradigm of hybrid encryption scheme
    • In: Franklin, M. (ed.), Springer, Heidelberg
    • Kurosawa, K., Desmedt, Y.G.: A new paradigm of hybrid encryption scheme. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 426-442. Springer, Heidelberg (2004)
    • (2004) CRYPTO 2004. LNCS , vol.3152 , pp. 426-442
    • Kurosawa, K.1    Desmedt, Y.G.2
  • 25
    • 79959686827 scopus 로고    scopus 로고
    • How to leak on key updates
    • ACM
    • Lewko, A., Lewko, M., Waters, B.: How to leak on key updates. In: STOC, pp. 725-734. ACM (2011)
    • (2011) STOC , pp. 725-734
    • Lewko, A.1    Lewko, M.2    Waters, B.3
  • 26
    • 79953164949 scopus 로고    scopus 로고
    • Achieving leakage resilience through dual system encryption
    • In: Ishai, Y. (ed.), Springer, Heidelberg
    • Lewko, A., Rouselakis, Y., Waters, B.: Achieving leakage resilience through dual system encryption. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 70-88. Springer, Heidelberg (2011)
    • (2011) TCC 2011. LNCS , vol.6597 , pp. 70-88
    • Lewko, A.1    Rouselakis, Y.2    Waters, B.3
  • 27
    • 35048852134 scopus 로고    scopus 로고
    • Physically observable cryptography
    • In: Naor, M. (ed.), Springer, Heidelberg
    • Micali, S., Reyzin, L.: Physically observable cryptography. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 278-296. Springer, Heidelberg (2004)
    • (2004) TCC 2004. LNCS , vol.2951 , pp. 278-296
    • Micali, S.1    Reyzin, L.2
  • 28
    • 70350303869 scopus 로고    scopus 로고
    • Public-key cryptosystems resilient to key leakage
    • In: Halevi, S. (ed.), Springer, Heidelberg
    • Naor, M., Segev, G.: Public-key cryptosystems resilient to key leakage. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 18-35. Springer, Heidelberg (2009)
    • (2009) CRYPTO 2009. LNCS , vol.5677 , pp. 18-35
    • Naor, M.1    Segev, G.2
  • 29
    • 0024983231 scopus 로고
    • Public-key cryptosystems provably secure against chosen ciphertext attacks
    • ACM
    • Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: STOC, pp. 427-437. ACM (1990)
    • (1990) STOC , pp. 427-437
    • Naor, M.1    Yung, M.2
  • 31
    • 67650675583 scopus 로고    scopus 로고
    • A leakage-resilient mode of operation
    • In: Joux, A. (ed.), Springer, Heidelberg
    • Pietrzak, K.: A leakage-resilient mode of operation. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 462-482. Springer, Heidelberg (2009)
    • (2009) EUROCRYPT 2009. LNCS , vol.5479 , pp. 462-482
    • Pietrzak, K.1
  • 32
    • 84892397038 scopus 로고    scopus 로고
    • Leakage-resilient chosen-ciphertext secure public-key encryption from hash proof system and one-time lossy filter
    • In: Sako, K., Sarkar, P. (eds.), Springer, Heidelberg
    • Qin, B., Liu, S.: Leakage-resilient chosen-ciphertext secure public-key encryption from hash proof system and one-time lossy filter. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. LNCS, vol. 8270, pp. 381-400. Springer, Heidelberg (2013)
    • (2013) ASIACRYPT 2013, Part II. LNCS , vol.8270 , pp. 381-400
    • Qin, B.1    Liu, S.2
  • 33
    • 84958538094 scopus 로고    scopus 로고
    • Leakage-flexible CCA-secure public-key encryption: Simple construction and free of pairing
    • In: Krawczyk, H. (ed.), Springer, Heidelberg
    • Qin, B., Liu, S.: Leakage-flexible CCA-secure public-key encryption: simple construction and free of pairing. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 19-36. Springer, Heidelberg (2014)
    • (2014) PKC 2014. LNCS , vol.8383 , pp. 19-36
    • Qin, B.1    Liu, S.2
  • 34
    • 78650238574 scopus 로고    scopus 로고
    • ElectroMagnetic Analysis (EMA): Measures and counter-measures for smart cards
    • In: Attali, S., Jensen, T. (eds.), Springer, Heidelberg
    • Quisquater, J.-J., Samyde, D.: ElectroMagnetic Analysis (EMA): measures and counter-measures for smart cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, p. 200. Springer, Heidelberg (2001)
    • (2001) E-Smart 2001. LNCS , vol.2140 , pp. 200
    • Quisquater, J.-J.1    Samyde, D.2
  • 35
    • 0033342534 scopus 로고    scopus 로고
    • Non-malleable non-interactive zero knowledge and adaptive chosenciphertext security
    • IEEE
    • Sahai, A.: Non-malleable non-interactive zero knowledge and adaptive chosenciphertext security. In: FOCS, pp. 543-553. IEEE (1999)
    • (1999) FOCS , pp. 543-553
    • Sahai, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.