Distributed Public Key Schemes Secure against Continual Leakage
In this work we study distributed public key schemes secure against continual memory leakage. The secret key will be shared among two computing devices communicating over a public channel, and the decryption operation will be computed by a simple 2-party protocol between the devices. Similarly, the...
Main Authors: | Akavia, Adi, Goldwasser, Shafi, Hazay, Carmit |
---|---|
Other Authors: | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory |
Format: | Article |
Language: | English |
Published: |
Association for Computing Machinery (ACM)
2021
|
Online Access: | https://hdl.handle.net/1721.1/137546 |
Similar Items
-
Securing computation against continuous leakage
by: Goldwasser, Shafi, et al.
Published: (2012) -
Circular and leakage resilient public-key encryption under subgroup indistinguishability (or: Quadratic residuosity strikes back)
by: Brakerski, Zvika, et al.
Published: (2012) -
Public-Key Encryption Schemes with Auxiliary Inputs. Theory of Cryptography
by: Dodis, Yevgeniy, et al.
Published: (2012) -
Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage
by: Jui-Di Wu, et al.
Published: (2020-01-01) -
Leakage-resilient coin tossing
by: Boyle, Elette, et al.
Published: (2012)