Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage

    Foundations of Computer Science, Volume 2010, 2010, Pages 501-510.

    Cited by: 224|Bibtex|Views15|Links
    EI WOS
    Keywords:
    identity-based encryption schemecontinual leakagearbitrary informationtime periodsecret memoryMore(15+)

    Abstract:

    In recent years, there has been a major effort to design cryptographic schemes that remain secure even when arbitrary information about the secret key is leaked (e.g., via side-channel attacks). We explore the possibility of achieving security under \emph{continual} leakage from the \emph{entire} secret key by designing schemes in which t...More

    Code:

    Data:

    Your rating :
    0

     

    Tags
    Comments