2016
DOI: 10.1007/978-3-319-39555-5_17
|View full text |Cite
|
Sign up to set email alerts
|

Deterministic Public-Key Encryption Under Continual Leakage

Abstract: Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O'Neill (CRYPTO 2007), is an important technique for searchable encryption; it allows quick, logarithmic-time, search over encrypted data items. The technique is most effective in scenarios where frequent search queries are performed over a huge database of unpredictable data items. We initiate the study of deterministic public-key encryption (D-PKE) in the presence of leakage. We formulate appropriate security notions for leakage-resi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 51 publications
0
4
0
Order By: Relevance
“…Stealing controlled secret keys for authentication. Secret keys are used to encrypt and decrypt sensitive messages [18,63,139]. Reconstructing the cryptographic keys means that one host is authenticated to read the message in some cases [46,56,106].…”
Section: 32mentioning
confidence: 99%
“…Stealing controlled secret keys for authentication. Secret keys are used to encrypt and decrypt sensitive messages [18,63,139]. Reconstructing the cryptographic keys means that one host is authenticated to read the message in some cases [46,56,106].…”
Section: 32mentioning
confidence: 99%
“…Based on the work of Brakerski et al [16], Koppula et al [23] firstly gave the security model of lossy trapdoor functions under continuous leakage and presented the lossy trapdoor functions against continuous leakage, which is a base of the deterministic public key encryption against continuous leakage. Their security model is mainly based on the all-but-one (ABO) LTFs of Peikert and Waters in [1].…”
Section: Our Motivationmentioning
confidence: 99%
“…Though Koppula et al [23] has introduced a notion of LTFs resilient to continual memory leakage, their notion was mainly based on the all-but-one (ABO) LTFs of Peikert and Waters in [1]. The new notion, which will be presented as follows, is mainly based on the LTFs structure of Qin and Liu et al [24], which is slightly different from the one introduced by Peikert and Waters in [1].…”
Section: Updatable Lossy Trapdoor Functionmentioning
confidence: 99%
See 1 more Smart Citation