{"id":"https://openalex.org/W2727285711","doi":"https://doi.org/10.1515/jmc-2019-0014","title":"New approach to practical leakage-resilient public-key cryptography","display_name":"New approach to practical leakage-resilient public-key cryptography","publication_year":2019,"publication_date":"2019-12-20","ids":{"openalex":"https://openalex.org/W2727285711","doi":"https://doi.org/10.1515/jmc-2019-0014","mag":"2727285711"},"language":"en","primary_location":{"id":"doi:10.1515/jmc-2019-0014","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2019-0014","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2019-0014/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},"type":"preprint","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2019-0014/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027651873","display_name":"Suvradip Chakraborty","orcid":"https://orcid.org/0000-0002-5352-4946"},"institutions":[{"id":"https://openalex.org/I24676775","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49","country_code":"IN","type":"facility","lineage":["https://openalex.org/I24676775"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Suvradip Chakraborty","raw_affiliation_strings":["Department of Computer Science and Engineering , Indian Institute of Technology Madras , Chennai , India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering , Indian Institute of Technology Madras , Chennai , India","institution_ids":["https://openalex.org/I24676775"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056029451","display_name":"Janaka Alawatugoda","orcid":"https://orcid.org/0000-0001-9431-5836"},"institutions":[{"id":"https://openalex.org/I111199411","display_name":"University of Peradeniya","ror":"https://ror.org/025h79t26","country_code":"LK","type":"education","lineage":["https://openalex.org/I111199411"]}],"countries":["LK"],"is_corresponding":false,"raw_author_name":"Janaka Alawatugoda","raw_affiliation_strings":["Department of Computer Science and Engineering , University of Peradeniya , Peradeniya , Sri Lanka"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering , University of Peradeniya , Peradeniya , Sri Lanka","institution_ids":["https://openalex.org/I111199411"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103487617","display_name":"C. Pandu Rangan","orcid":null},"institutions":[{"id":"https://openalex.org/I24676775","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49","country_code":"IN","type":"facility","lineage":["https://openalex.org/I24676775"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Chandrasekaran Pandu Rangan","raw_affiliation_strings":["Department of Computer Science and Engineering , Indian Institute of Technology Madras , Chennai , India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering , Indian Institute of Technology Madras , Chennai , India","institution_ids":["https://openalex.org/I24676775"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5027651873"],"corresponding_institution_ids":["https://openalex.org/I24676775"],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":{"value":1000,"currency":"EUR","value_usd":1078},"fwci":0.1445,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.54426103,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"14","issue":"1","first_page":"172","last_page":"201"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6797793507575989},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.6244659423828125},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6193345785140991},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6072069406509399},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5512847304344177},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5187642574310303},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2008109986782074},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.047914475202560425}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6797793507575989},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.6244659423828125},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6193345785140991},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6072069406509399},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5512847304344177},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5187642574310303},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2008109986782074},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.047914475202560425},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1515/jmc-2019-0014","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2019-0014","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2019-0014/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},{"id":"mag:2727285711","is_oa":false,"landing_page_url":"https://eprint.iacr.org/2017/441.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S2764847869","display_name":"IACR Cryptology ePrint Archive","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":["https://openalex.org/P4322614454"],"host_organization_lineage_names":["Cryptology ePrint Archive"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Cryptology ePrint Archive","raw_type":null},{"id":"pmh:oai:research-repository.griffith.edu.au:10072/414371","is_oa":true,"landing_page_url":"http://hdl.handle.net/10072/414371","pdf_url":null,"source":{"id":"https://openalex.org/S4306402548","display_name":"Griffith Research Online (Griffith University, Queensland, Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I11701301","host_organization_name":"Griffith University","host_organization_lineage":["https://openalex.org/I11701301"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal article"}],"best_oa_location":{"id":"doi:10.1515/jmc-2019-0014","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2019-0014","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2019-0014/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Climate action","score":0.6000000238418579,"id":"https://metadata.un.org/sdg/13"}],"awards":[{"id":"https://openalex.org/G7035208758","display_name":null,"funder_award_id":"URG/2018/19/E","funder_id":"https://openalex.org/F4320325474","funder_display_name":"University of Peradeniya"}],"funders":[{"id":"https://openalex.org/F4320322211","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49"},{"id":"https://openalex.org/F4320325474","display_name":"University of Peradeniya","ror":"https://ror.org/025h79t26"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2727285711.pdf","grobid_xml":"https://content.openalex.org/works/W2727285711.grobid-xml"},"referenced_works_count":8,"referenced_works":["https://openalex.org/W2051510359","https://openalex.org/W2060474153","https://openalex.org/W2113999696","https://openalex.org/W2146813141","https://openalex.org/W2547497046","https://openalex.org/W2753217432","https://openalex.org/W2914157499","https://openalex.org/W2992355230"],"related_works":["https://openalex.org/W1544256399","https://openalex.org/W3203330054","https://openalex.org/W1966025096","https://openalex.org/W81062926","https://openalex.org/W2994176767","https://openalex.org/W92571556","https://openalex.org/W2005673565","https://openalex.org/W2725471793","https://openalex.org/W2102542363","https://openalex.org/W2807422419","https://openalex.org/W2111604704","https://openalex.org/W3160069437","https://openalex.org/W63682039","https://openalex.org/W3031649512","https://openalex.org/W2768321640","https://openalex.org/W1585813234","https://openalex.org/W1668469472","https://openalex.org/W2067402374","https://openalex.org/W3193929009","https://openalex.org/W2116250591"],"abstract_inverted_index":{"Abstract":[0],"We":[1,44,60,98,158,216,240],"present":[2,230],"a":[3,34,63,90,94,105,163,175,218,231,259],"new":[4,35,219],"approach":[5],"to":[6,110,129,161,201],"construct":[7,130,162],"several":[8],"leakage-resilient":[9,13,38,133,164,232,260],"cryptographic":[10],"primitives,":[11,194],"including":[12],"public-key":[14],"encryption":[15],"(PKE)":[16],"schemes,":[17],"authenticated":[18],"key":[19,25,40],"exchange":[20,26,41],"(AKE)":[21],"protocols":[22,52,248],"and":[23,229,253],"low-latency":[24],"(LLKE)":[27],"protocols.":[28],"To":[29],"this":[30],"end,":[31],"we":[32,126],"introduce":[33,45,217,241],"primitive":[36],"called":[37],"non-interactive":[39],"(LR-NIKE)":[42],"protocol.":[43,157,179,215,239,265],"an":[46,76,117,137],"appropriate":[47],"security":[48],"model":[49,172,221,245],"for":[50,222,246],"LR-NIKE":[51,68,88,118,138,156,177,238,264],"in":[53,70,113,121,169,225,249],"the":[54,67,71,101,122,131,148,154,170,189,209,212,226,237,242,250,254,263],"bounded":[55,176],"memory":[56],"leakage":[57,78,151,203,220,244],"(BML)":[58],"settings.":[59],"then":[61],"show":[62,127,159],"secure":[64,184],"construction":[65,86,115,181,235,256],"of":[66,87,93,103,116,182,192,211,257],"protocol":[69,139,234],"BML":[72,123,171,227,251],"setting":[73,252],"that":[74,100],"achieves":[75],"optimal":[77],"rate,":[79],"i.e.,":[80],"1":[81],"\u2013":[82],"o":[83],"(1).":[84],"Our":[85,180],"requires":[89],"minimal":[91],"use":[92,102,197],"leak-free":[95,106],"hardware":[96,107],"component.":[97],"argue":[99],"such":[104,136,258],"component":[108],"seems":[109],"be":[111],"unavoidable":[112],"any":[114],"protocol,":[119],"even":[120],"setting.":[124],"Finally,":[125],"how":[128,160],"aforementioned":[132],"primitives":[134,145],"from":[135,174,188,236,262],"as":[140,153],"summarized":[141],"below.":[142],"All":[143],"these":[144,193],"also":[146],"achieve":[147,202],"same":[149],"(optimal)":[150],"rate":[152],"underlying":[155,213],"(LR)":[165],"IND-CCA-2-secure":[166],"PKE":[167,185],"scheme":[168],"generically":[173],"(BLR-NIKE)":[178],"LR-IND-CCA-2":[183],"differs":[186],"significantly":[187],"state-of-the-art":[190],"constructions":[191],"which":[195],"mainly":[196],"hash":[198],"proof":[199],"techniques":[200],"resilience.":[204],"Moreover,":[205],"our":[206],"transformation":[207],"preserves":[208],"leakage-rate":[210],"BLR-NIKE":[214],"AKE":[223,233],"protocols,":[224],"setting,":[228],"first-ever":[243],"LLKE":[247,261],"first":[255]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
