A survey of leakage-resilient cryptography

YT Kalai, L Reyzin - Providing Sound Foundations for Cryptography: On …, 2019 - dl.acm.org
In the past 15 years, cryptography has made considerable progress in expanding the
adversarial attack model to cover side-channel attacks and has built schemes to provably …

Storing secrets on continually leaky devices

Y Dodis, A Lewko, B Waters… - 2011 IEEE 52nd Annual …, 2011 - ieeexplore.ieee.org
We consider the question of how to store a value secretly on devices that continually leak
information about their internal state to an external attacker. If the secret value is stored on a …

Provably secure identity‐based encryption resilient to post‐challenge continuous auxiliary input leakage

J Li, Y Guo, Q Yu, Y Lu, Y Zhang - Security and Communication …, 2016 - Wiley Online Library
The situation for post‐challenge continuous auxiliary input leakage has not been considered
in the cryptography schemes for previous literature. We present a semantic‐security model …

A direct construction of continuous leakage-resilient (H) IBE scheme with CCA security from dual system encryption

Y Zhou, L Cao, B Yang, Z Xia, C Gu, M Zhang - Computer Standards & …, 2023 - Elsevier
Continuous leakage resilient semantically secure Identity-based Encryption (IBE) schemes
created with dual system encryption technique were presented by Lewko et al. at TCC 2011 …

Continuous leakage-resilient certificate-based encryption

J Li, Y Guo, Q Yu, Y Lu, Y Zhang, F Zhang - Information Sciences, 2016 - Elsevier
Encryption schemes are generally considered to be secure in an ideal environment, where
the adversary cannot obtain the secret internal state of schemes. However, in the realistic …

[HTML][HTML] Provably secure certificate-based encryption with leakage resilience

Y Guo, J Li, Y Lu, Y Zhang, F Zhang - Theoretical Computer Science, 2018 - Elsevier
The security of encryption schemes, in general, has been considered in an ideal
environment, where the adversary cannot obtain the secret internal state of the scheme …

Continuous leakage-resilient identity-based encryption without random oracles

Y Zhou, B Yang, Y Mu - The Computer Journal, 2018 - academic.oup.com
Provably secure identity-based encryption (IBE) schemes in the presence of key-leakage
have attracted a lot of attention recently. However, most of them were designed in the …

Continuous leakage-resilient public-key encryption scheme with CCA security

Y Zhou, B Yang - The Computer Journal, 2017 - academic.oup.com
In recent years, much attention has been focused on designing provably secure public-key
encryption (PKE) scheme in the presence of key-leakage. However, most of them are …

Leakage-resilient coin tossing

E Boyle, S Goldwasser, YT Kalai - Distributed computing, 2014 - Springer
The ability to collectively toss a common coin among nn parties in the presence of faults is
an important primitive in the arsenal of randomized distributed protocols. In the case of …

Novel public-key encryption with continuous leakage amplification

Z Qiao, Q Yang, Y Zhou, Z Xia… - The Computer Journal, 2021 - academic.oup.com
Leakage of private information, such as the secret keys, has become a threat to the security
of computing systems. It has become a common requirement that cryptographic schemes …