Sciweavers

21 search results - page 5 / 5
» Constant Size Ring Signature Without Random Oracle
Sort
View
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs