Sciweavers

16 search results - page 4 / 4
» Predicate Encryption with Partial Public Keys
Sort
View
IACR
2011
88views more  IACR 2011»
12 years 10 months ago
Storing Secrets on Continually Leaky Devices
We consider the question of how to store a value secretly on devices that continually leak information about their internal state to an external attacker. If the secret value is s...
Yevgeniy Dodis, Allison B. Lewko, Brent Waters, Da...