{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:32:19Z","timestamp":1773513139414,"version":"3.50.1"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2012,10,31]],"date-time":"2012-10-31T00:00:00Z","timestamp":1351641600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1007\/s00145-012-9136-3","type":"journal-article","created":{"date-parts":[[2012,10,30]],"date-time":"2012-10-30T11:57:20Z","timestamp":1351598240000},"page":"513-558","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Fully Leakage-Resilient Signatures"],"prefix":"10.1007","volume":"26","author":[{"given":"Elette","family":"Boyle","sequence":"first","affiliation":[]},{"given":"Gil","family":"Segev","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Wichs","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,10,31]]},"reference":[{"key":"9136_CR1","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/978-3-642-00457-5_28","volume-title":"Proceedings of the 6th Theory of Cryptography Conference","author":"A. Akavia","year":"2009","unstructured":"A. Akavia, S. Goldwasser, V. Vaikuntanathan, Simultaneous hardcore bits and cryptography against memory attacks, in Proceedings of the 6th Theory of Cryptography Conference (2009), pp. 474\u2013495"},{"key":"9136_CR2","first-page":"113","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201910","author":"J. Alwen","year":"2010","unstructured":"J. Alwen, Y. Dodis, M. Naor, G. Segev, S. Walfish, D. Wichs, Public-key encryption in the bounded-retrieval model, in Advances in Cryptology\u2014EUROCRYPT\u201910 (2010), pp. 113\u2013134"},{"key":"9136_CR3","first-page":"36","volume-title":"Advances in Cryptology\u2014CRYPTO\u201909","author":"J. Alwen","year":"2009","unstructured":"J. Alwen, Y. Dodis, D. Wichs, Leakage-resilient public-key cryptography in the bounded-retrieval model, in Advances in Cryptology\u2014CRYPTO\u201909 (2009), pp. 36\u201354"},{"key":"9136_CR4","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1145\/1102120.1102134","volume-title":"Proceedings of the 12th ACM Conference on Computer and Communications Security","author":"G. Ateniese","year":"2005","unstructured":"G. Ateniese, J. Camenisch, B. de Medeiros, Untraceable RFID tags via insubvertible encryption, in Proceedings of the 12th ACM Conference on Computer and Communications Security (2005), pp. 92\u2013101"},{"issue":"5","key":"9136_CR5","doi-asserted-by":"publisher","first-page":"1661","DOI":"10.1137\/070709244","volume":"38","author":"B. Barak","year":"2008","unstructured":"B. Barak, O. Goldreich, Universal arguments and their applications. SIAM J. Comput.\n                           38(5), 1661\u20131694 (2008)","journal-title":"SIAM J. Comput."},{"key":"9136_CR6","first-page":"194","volume-title":"Advances in Cryptology\u2014CRYPTO\u201989","author":"M. Bellare","year":"1989","unstructured":"M. Bellare, S. Goldwasser, New paradigms for digital signatures and message authentication based on non-interative zero knowledge proofs, in Advances in Cryptology\u2014CRYPTO\u201989 (1989), pp. 194\u2013211"},{"key":"9136_CR7","first-page":"1","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201909","author":"M. Bellare","year":"2009","unstructured":"M. Bellare, D. Hofheinz, S. Yilek, Possibility and impossibility results for encryption and commitment secure under selective opening, in Advances in Cryptology\u2014EUROCRYPT\u201909 (2009), pp. 1\u201335"},{"key":"9136_CR8","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology\u2014CRYPTO\u201997","author":"E. Biham","year":"1997","unstructured":"E. Biham, A. Shamir, Differential fault analysis of secret key cryptosystems, in Advances in Cryptology\u2014CRYPTO\u201997 (1997), pp. 513\u2013525"},{"key":"9136_CR9","first-page":"443","volume-title":"Advances in Cryptology\u2014CRYPTO\u201904","author":"D. Boneh","year":"2004","unstructured":"D. Boneh, X. Boyen, Secure identity based encryption without random oracles, in Advances in Cryptology\u2014CRYPTO\u201904 (2004), pp. 443\u2013459"},{"key":"9136_CR10","first-page":"41","volume-title":"Advances in Cryptology\u2014CRYPTO\u201904","author":"D. Boneh","year":"2004","unstructured":"D. Boneh, X. Boyen, H. Shacham, Short group signatures, in Advances in Cryptology\u2014CRYPTO\u201904 (2004), pp. 41\u201355"},{"key":"9136_CR11","first-page":"37","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201997","author":"D. Boneh","year":"1997","unstructured":"D. Boneh, R.A. DeMillo, R.J. Lipton, On the importance of checking cryptographic protocols for faults, in Advances in Cryptology\u2014EUROCRYPT\u201997 (1997), pp. 37\u201351"},{"key":"9136_CR12","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-540-30576-7_18","volume-title":"Proceedings of the 2nd Theory of Cryptography Conference","author":"D. Boneh","year":"2005","unstructured":"D. Boneh, E.-J. Goh, K. Nissim, Evaluating 2-DNF formulas on ciphertexts, in Proceedings of the 2nd Theory of Cryptography Conference (2005), pp. 325\u2013341"},{"key":"9136_CR13","first-page":"1","volume-title":"Advances in Cryptology\u2014CRYPTO\u201910","author":"Z. Brakerski","year":"2010","unstructured":"Z. Brakerski, S. Goldwasser, Circular and leakage resilient public-key encryption under subgroup indistinguishability (or: quadratic residuosity strikes back), in Advances in Cryptology\u2014CRYPTO\u201910 (2010), pp. 1\u201320"},{"key":"9136_CR14","unstructured":"Z. Brakerski, Y. Tauman Kalai, A framework for efficient signatures, ring signatures and identity based encryption in the standard model. Cryptology ePrint Archive, Report 2010\/086, 2010"},{"key":"9136_CR15","first-page":"501","volume-title":"Proceedings of the 51st Annual IEEE Symposium on Foundations of Computer Science","author":"Z. Brakerski","year":"2010","unstructured":"Z. Brakerski, Y. Tauman Kalai, J. Katz, V. Vaikuntanathan, Cryptography resilient to continual memory leakage, in Proceedings of the 51st Annual IEEE Symposium on Foundations of Computer Science (2010), pp. 501\u2013510"},{"key":"9136_CR16","first-page":"523","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201910","author":"D. Cash","year":"2010","unstructured":"D. Cash, D. Hofheinz, E. Kiltz, C. Peikert, Bonsai trees, or how to delegate a lattice basis, in Advances in Cryptology\u2014EUROCRYPT\u201910 (2010), pp. 523\u2013552"},{"key":"9136_CR17","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-642-11799-2_22","volume-title":"Proceedings of the 7th Theory of Cryptography Conference","author":"Y. Dodis","year":"2010","unstructured":"Y. Dodis, S. Goldwasser, Y. Tauman Kalai, C. Peikert, V. Vaikuntanathan, Public-key encryption schemes with auxiliary inputs, in Proceedings of the 7th Theory of Cryptography Conference (2010), pp. 361\u2013381"},{"key":"9136_CR18","first-page":"511","volume-title":"Proceedings of the 51st Annual IEEE Symposium on Foundations of Computer Science","author":"Y. Dodis","year":"2010","unstructured":"Y. Dodis, K. Haralambiev, A. Lopez-Alt, D. Wichs, Cryptography against continuous memory attacks, in Proceedings of the 51st Annual IEEE Symposium on Foundations of Computer Science (2010), pp.\u00a0511\u2013520"},{"key":"9136_CR19","first-page":"613","volume-title":"Advances in Cryptology\u2014ASIACRYPT\u201910","author":"Y. Dodis","year":"2010","unstructured":"Y. Dodis, K. Haralambiev, A. Lopez-Alt, D. Wichs, Efficient public-key cryptography in the presence of key leakage, in Advances in Cryptology\u2014ASIACRYPT\u201910 (2010), pp. 613\u2013631"},{"key":"9136_CR20","first-page":"688","volume-title":"Proceedings of the 52nd Annual IEEE Symposium on Foundations of Computer Science","author":"Y. Dodis","year":"2011","unstructured":"Y. Dodis, A.B. Lewko, B. Waters, D. Wichs, Storing secrets on continually leaky devices, in Proceedings of the 52nd Annual IEEE Symposium on Foundations of Computer Science (2011), pp. 688\u2013697"},{"issue":"1","key":"9136_CR21","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y. Dodis","year":"2008","unstructured":"Y. Dodis, R. Ostrovsky, L. Reyzin, A. Smith, Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput.\n                           38(1), 97\u2013139 (2008)","journal-title":"SIAM J. Comput."},{"key":"9136_CR22","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1145\/1536414.1536498","volume-title":"Proceedings of the 41st Annual ACM Symposium on Theory of Computing","author":"Y. Dodis","year":"2009","unstructured":"Y. Dodis, Y. Tauman Kalai, S. Lovett, On cryptography with auxiliary input, in Proceedings of the 41st Annual ACM Symposium on Theory of Computing (2009), pp. 621\u2013630"},{"key":"9136_CR23","first-page":"293","volume-title":"Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science","author":"S. Dziembowski","year":"2008","unstructured":"S. Dziembowski, K. Pietrzak, Leakage-resilient cryptography, in Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science (2008), pp. 293\u2013302"},{"key":"9136_CR24","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-642-11799-2_21","volume-title":"Proceedings of the 7th Theory of Cryptography Conference","author":"S. Faust","year":"2010","unstructured":"S. Faust, E. Kiltz, K. Pietrzak, G.N. Rothblum, Leakage-resilient signatures, in Proceedings of the 7th Theory of Cryptography Conference (2010), pp. 343\u2013360"},{"key":"9136_CR25","first-page":"135","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201910","author":"S. Faust","year":"2010","unstructured":"S. Faust, T. Rabin, L. Reyzin, E. Tromer, V. Vaikuntanathan, Protecting circuits from leakage: the computationally-bounded and noisy cases, in Advances in Cryptology\u2014EUROCRYPT\u201910 (2010), pp.\u00a0135\u2013156"},{"key":"9136_CR26","first-page":"186","volume-title":"Advances in Cryptology\u2014CRYPTO\u201986","author":"A. Fiat","year":"1986","unstructured":"A. Fiat, A. Shamir, How to prove yourself: practical solutions to identification and signature problems, in Advances in Cryptology\u2014CRYPTO\u201986 (1986), pp. 186\u2013194"},{"key":"9136_CR27","first-page":"279","volume-title":"Proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography","author":"D.M. Freeman","year":"2010","unstructured":"D.M. Freeman, O. Goldreich, E. Kiltz, A. Rosen, G. Segev, More constructions of lossy and correlation-secure trapdoor functions, in Proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography (2010), pp. 279\u2013295"},{"key":"9136_CR28","first-page":"297","volume-title":"Advances in Cryptology\u2014CRYPTO\u201911","author":"S. Garg","year":"2011","unstructured":"S. Garg, A. Jain, A. Sahai, Leakage-resilient zero knowledge, in Advances in Cryptology\u2014CRYPTO\u201911 (2011), pp. 297\u2013315"},{"issue":"2","key":"9136_CR29","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser, S. Micali, Probabilistic encryption. J. Comput. Syst. Sci.\n                           28(2), 270\u2013299 (1984)","journal-title":"J. Comput. Syst. Sci."},{"issue":"2","key":"9136_CR30","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, R.L. Rivest, A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput.\n                           17(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"key":"9136_CR31","first-page":"59","volume-title":"Advances in Cryptology\u2014CRYPTO\u201910","author":"S. Goldwasser","year":"2010","unstructured":"S. Goldwasser, G. Rothblum, How to play mental solitaire under continuous side-channels: a\u00a0completeness theorem using secure hardware, in Advances in Cryptology\u2014CRYPTO\u201910 (2010), pp. 59\u201379"},{"key":"9136_CR32","first-page":"230","volume-title":"Proceedings of the 1st Symposium on Innovations in Computer Science","author":"S. Goldwasser","year":"2010","unstructured":"S. Goldwasser, Y. Tauman Kalai, C. Peikert, V. Vaikuntanathan, Robustness of the learning with errors assumption, in Proceedings of the 1st Symposium on Innovations in Computer Science (2010), pp. 230\u2013240"},{"key":"9136_CR33","first-page":"339","volume-title":"Advance in Cryptology\u2014EUROCRYPT\u201906","author":"J. Groth","year":"2006","unstructured":"J. Groth, R. Ostrovsky, A. Sahai, Perfect non-interactive zero knowledge for NP, in Advance in Cryptology\u2014EUROCRYPT\u201906 (2006), pp. 339\u2013358"},{"key":"9136_CR34","first-page":"415","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201908","author":"J. Groth","year":"2008","unstructured":"J. Groth, A. Sahai, Efficient non-interactive proof systems for bilinear groups, in Advances in Cryptology\u2014EUROCRYPT\u201908 (2008), pp. 415\u2013432"},{"key":"9136_CR35","first-page":"45","volume-title":"Proceedings of the 17th USENIX Security Symposium","author":"J.A. Halderman","year":"2008","unstructured":"J.A. Halderman, S.D. Schoen, N. Heninger, W. Clarkson, W. Paul, J.A. Calandrino, A.J. Feldman, J.\u00a0Appelbaum, E.W.\u00a0Felten, Lest we remember: cold boot attacks on encryption keys, in Proceedings of the 17th USENIX Security Symposium (2008), pp. 45\u201360"},{"key":"9136_CR36","first-page":"70","volume-title":"Advances in Cryptology\u2014ASIACRYPT\u201911","author":"B. Hemenway","year":"2011","unstructured":"B. Hemenway, B. Libert, R. Ostrovsky, D. Vergnaud, Lossy encryption: constructions from general assumptions and efficient selective opening chosen ciphertext security, in Advances in Cryptology\u2014ASIACRYPT\u201911 (2011), pp. 70\u201388"},{"key":"9136_CR37","first-page":"1","volume-title":"Advances in Cryptology\u2014CRYPTO\u201909","author":"N. Heninger","year":"2009","unstructured":"N. Heninger, H. Shacham, Reconstructing RSA private keys from random key bits, in Advances in Cryptology\u2014CRYPTO\u201909 (2009), pp. 1\u201317"},{"key":"9136_CR38","first-page":"654","volume-title":"Advances in Cryptology\u2014CRYPTO\u201909","author":"S. Hohenberger","year":"2009","unstructured":"S. Hohenberger, B. Waters, Short and stateless signatures from the RSA assumption, in Advances in Cryptology\u2014CRYPTO\u201909 (2009), pp. 654\u2013670"},{"key":"9136_CR39","first-page":"92","volume-title":"Advances in Cryptology\u2014CRYPTO\u201904","author":"C.-Y. Hsiao","year":"2004","unstructured":"C.-Y. Hsiao, L. Reyzin, Finding collisions on a public road, or do secure hash functions need secret coins, in Advances in Cryptology\u2014CRYPTO\u201904 (2004), pp. 92\u2013105"},{"key":"9136_CR40","first-page":"463","volume-title":"Advances in Cryptology\u2014CRYPTO\u201903","author":"Y. Ishai","year":"2003","unstructured":"Y. Ishai, A. Sahai, D. Wagner, Private circuits: securing hardware against probing attacks, in Advances in Cryptology\u2014CRYPTO\u201903 (2003), pp. 463\u2013481"},{"issue":"4","key":"9136_CR41","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s00145-003-0052-4","volume":"16","author":"A. Joux","year":"2003","unstructured":"A. Joux, K. Nguyen, Separating decision Diffie\u2013Hellman from computational Diffie\u2013Hellman in cryptographic groups. J. Cryptol.\n                           16(4), 239\u2013247 (2003)","journal-title":"J. Cryptol."},{"key":"9136_CR42","first-page":"41","volume-title":"Advances in Cryptology\u2014CRYPTO\u201910","author":"A. Juma","year":"2010","unstructured":"A. Juma, Y. Vahlis, On protecting cryptographic keys against side-channel attacks, in Advances in Cryptology\u2014CRYPTO\u201910 (2010), pp. 41\u201358"},{"key":"9136_CR43","first-page":"703","volume-title":"Advances in Cryptology\u2014ASIACRYPT\u201909","author":"J. Katz","year":"2009","unstructured":"J. Katz, V. Vaikuntanathan, Signature schemes with bounded leakage resilience, in Advances in Cryptology\u2014ASIACRYPT\u201909 (2009), pp. 703\u2013720"},{"key":"9136_CR44","first-page":"723","volume-title":"Proceedings of the 22nd Annual ACM Symposium on Theory of Computing","author":"J. Kilian","year":"1992","unstructured":"J. Kilian, A note on efficient zero-knowledge proofs and arguments (extended abstract), in Proceedings of the 22nd Annual ACM Symposium on Theory of Computing (1992), pp. 723\u2013732"},{"key":"9136_CR45","first-page":"282","volume-title":"Proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography","author":"E. Kiltz","year":"2007","unstructured":"E. Kiltz, Chosen-ciphertext secure key-encapsulation based on gap hashed Diffie\u2013Hellman, in Proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography (2007), pp. 282\u2013297"},{"key":"9136_CR46","first-page":"104","volume-title":"Advances in Cryptology\u2014CRYPTO\u201996","author":"P.C. Kocher","year":"1996","unstructured":"P.C. Kocher, Timing attacks on implementations of Diffie\u2013Hellman, RSA, DSS, and other systems, in Advances in Cryptology\u2014CRYPTO\u201996 (1996), pp. 104\u2013113"},{"key":"9136_CR47","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology\u2014CRYPTO\u201999","author":"P.C. Kocher","year":"1999","unstructured":"P.C. Kocher, J. Jaffe, B. Jun, Differential power analysis, in Advances in Cryptology\u2014CRYPTO\u201999 (1999), pp. 388\u2013397"},{"key":"9136_CR48","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-540-78524-8_18","volume-title":"Proceedings of the 5th Theory of Cryptography Conference","author":"G. Kol","year":"2008","unstructured":"G. Kol, M. Naor, Cryptography and game theory: designing protocols for exchanging information, in Proceedings of the 5th Theory of Cryptography Conference (2008), pp. 320\u2013339"},{"key":"9136_CR49","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)","author":"H. Krawczyk","year":"2000","unstructured":"H. Krawczyk, T. Rabin, Chameleon signatures, in Proceedings of the Network and Distributed System Security Symposium (NDSS) (2000)"},{"key":"9136_CR50","first-page":"725","volume-title":"Proceedings of the 43rd Annaul ACM Symposium on Theory of Computing","author":"A.B. Lewko","year":"2011","unstructured":"A.B. Lewko, M. Lewko, B. Waters, How to leak on key updates, in Proceedings of the 43rd Annaul ACM Symposium on Theory of Computing (2011), pp. 725\u2013734"},{"key":"9136_CR51","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/978-3-642-11799-2_23","volume-title":"Proceedings of the 7th Theory of Cryptography Conference","author":"V. Lyubashevsky","year":"2010","unstructured":"V. Lyubashevsky, A. Palacio, G. Segev, Public-key cryptographic primitives provably as secure as subset sum, in Proceedings of the 7th Theory of Cryptography Conference (2010), pp. 382\u2013400"},{"key":"9136_CR52","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-642-19571-6_7","volume-title":"Proceedings of the 8th Theory of Cryptography Conference","author":"T. Malkin","year":"2011","unstructured":"T. Malkin, I. Teranishi, Y. Vahlis, M. Yung, Signatures resilient to continual leakage on memory and computation, in Proceedings of the 8th Theory of Cryptography Conference (2011), pp. 89\u2013106"},{"issue":"4","key":"9136_CR53","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1137\/S0097539795284959","volume":"30","author":"S. Micali","year":"2000","unstructured":"S. Micali, Computationally sound proofs. SIAM J. Comput.\n                           30(4), 1253\u20131298 (2000)","journal-title":"SIAM J. Comput."},{"key":"9136_CR54","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-540-24638-1_16","volume-title":"Proceedings of the 1st Theory of Cryptography Conference","author":"S. Micali","year":"2004","unstructured":"S. Micali, L. Reyzin, Physically observable cryptography, in Proceedings of the 1st Theory of Cryptography Conference (2004), pp. 278\u2013296"},{"key":"9136_CR55","first-page":"18","volume-title":"Advances in Cryptology\u2014CRYPTO\u201909","author":"M. Naor","year":"2009","unstructured":"M. Naor, G. Segev, Public-key cryptosystems resilient to key leakage, in Advances in Cryptology\u2014CRYPTO\u201909 (2009), pp. 18\u201335"},{"key":"9136_CR56","first-page":"33","volume-title":"Proceedings of the 21st Annual ACM Symposium on Theory of Computing","author":"M. Naor","year":"1989","unstructured":"M. Naor, M. Yung, Universal one-way hash functions and their cryptographic applications, in Proceedings of the 21st Annual ACM Symposium on Theory of Computing (1989), pp. 33\u201343"},{"key":"9136_CR57","first-page":"554","volume-title":"Advances in Cryptology\u2014CRYPTO\u201908","author":"C. Peikert","year":"2008","unstructured":"C. Peikert, V. Vaikuntanathan, B. Waters, A framework for efficient and composable oblivious transfer, in Advances in Cryptology\u2014CRYPTO\u201908 (2008), pp. 554\u2013571"},{"issue":"6","key":"9136_CR58","doi-asserted-by":"publisher","first-page":"1803","DOI":"10.1137\/080733954","volume":"40","author":"C. Peikert","year":"2011","unstructured":"C. Peikert, B. Waters, Lossy trapdoor functions and their applications. SIAM J. Comput.\n                           40(6), 1803\u20131844 (2011)","journal-title":"SIAM J. Comput."},{"key":"9136_CR59","first-page":"462","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201909","author":"K. Pietrzak","year":"2009","unstructured":"K. Pietrzak, A leakage-resilient mode of operation, in Advances in Cryptology\u2014EUROCRYPT\u201909 (2009), pp. 462\u2013482"},{"key":"9136_CR60","first-page":"387","volume-title":"Proceedings of the 22nd Annual ACM Symposium on Theory of Computing","author":"J. Rompel","year":"1990","unstructured":"J. Rompel, One-way functions are necessary and sufficient for secure signatures, in Proceedings of the 22nd Annual ACM Symposium on Theory of Computing (1990), pp. 387\u2013394"},{"key":"9136_CR61","unstructured":"H. Shacham, A Cramer\u2013Shoup encryption scheme from the linear assumption and from progressively weaker linear variants. Cryptology ePrint Archive, Report 2007\/074 (2007)"},{"key":"9136_CR62","first-page":"256","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201997","author":"V. Shoup","year":"1997","unstructured":"V. Shoup, Lower bounds for discrete logarithms and related problems, in Advances in Cryptology\u2014EUROCRYPT\u201997 (1997), pp. 256\u2013266"},{"key":"9136_CR63","first-page":"373","volume-title":"Advances in Cryptology\u2014CRYPTO\u201911","author":"Y. Tauman Kalai","year":"2011","unstructured":"Y. Tauman Kalai, B. Kanukurthi, A. Sahai, Cryptography with tamperable and leaky memory, in Advances in Cryptology\u2014CRYPTO\u201911 (2011), pp. 373\u2013390"},{"key":"9136_CR64","first-page":"114","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201905","author":"B. Waters","year":"2005","unstructured":"B. Waters, Efficient identity-based encryption without random oracles, in Advances in Cryptology\u2014EUROCRYPT\u201905 (2005), pp. 114\u2013127"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-012-9136-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-012-9136-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-012-9136-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-012-9136-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T08:09:11Z","timestamp":1586333351000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-012-9136-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,31]]},"references-count":64,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,7]]}},"alternative-id":["9136"],"URL":"https:\/\/doi.org\/10.1007\/s00145-012-9136-3","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,10,31]]},"assertion":[{"value":"10 April 2012","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 October 2012","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}