![]() ![]() īoyle, E., Segev, G., Wichs, D.: Fully leakage-resilient signatures. īoyle, E., Goldwasser, S., Ivan, I.: Functional signatures and pseudorandom functions. ![]() 14(2), 101–119 (2001)īoneh, D., Waters, B.: Constrained pseudorandom functions and their applications. īoneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of eliminating errors in cryptographic computations. īlum, M., Feldman, P., Micali, S.: Non-interactive zero-knowledge and its applications (extended abstract). īellare, M., Stepanovs, I., Waters, B.: New negative results on differing-inputs obfuscation. Īlwen, J., Krenn, S., Pietrzak, K., Wichs, D.: Learning with rounding, revisited. Our construction achieves the optimal leakage rate of \(1 - o(1)\).Īlwen, J., Dodis, Y., Wichs, D.: Leakage-resilient public-key cryptography in the bounded-retrieval model. A Unique Witness Map (UWM) deterministically maps all witnesses for an \(\mathbf \) and sub-exponentially secure OWF.Īs an application of our constructions, we show how to use a DMWM to construct the first leakage and tamper-resilient signatures with a deterministic signer, thereby solving a decade old open problem posed by Katz and Vaikunthanathan (Asiacrypt 2009), by Boyle, Segev and Wichs (Eurocrypt 2011), as well as by Faonio and Venturi (Asiacrypt 2016). We introduce the notion of Witness Maps as a cryptographic notion of a proof system.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |