%PDF-1.4 % 5 0 obj << /S /GoTo /D (section.1) >> endobj 8 0 obj (Introduction) endobj 9 0 obj << /S /GoTo /D (section.2) >> endobj 12 0 obj (Preliminaries) endobj 13 0 obj << /S /GoTo /D (subsection.2.1) >> endobj 16 0 obj (Fully Homomorphic Encryption) endobj 17 0 obj << /S /GoTo /D (section.3) >> endobj 20 0 obj (Models and Definitions) endobj 21 0 obj << /S /GoTo /D (section.4) >> endobj 24 0 obj (Leakage Resilient Key Proxies From Homomorphic Encryption) endobj 25 0 obj << /S /GoTo /D (section.5) >> endobj 28 0 obj (Extensions and Applications) endobj 29 0 obj << /S /GoTo /D (appendix.A) >> endobj 32 0 obj (Probabilistic Lemmas) endobj 33 0 obj << /S /GoTo /D (appendix.B) >> endobj 36 0 obj (Proof of Theorem 1) endobj 37 0 obj << /S /GoTo /D (subsection.B.1) >> endobj 40 0 obj (Hybrid Experiment Structure) endobj 41 0 obj << /S /GoTo /D (subsection.B.2) >> endobj 44 0 obj (Analysis of Exp1) endobj 45 0 obj << /S /GoTo /D (appendix.C) >> endobj 48 0 obj (Proof of Claim B.7) endobj 49 0 obj << /S /GoTo /D (appendix.D) >> endobj 52 0 obj (Concurrent Composition) endobj 53 0 obj << /S /GoTo /D (appendix.E) >> endobj 56 0 obj (Application: Private Key Encryption) endobj 57 0 obj << /S /GoTo /D (subsection.E.1) >> endobj 60 0 obj (Semantic Security Under Leakage) endobj 61 0 obj << /S /GoTo /D (subsection.E.2) >> endobj 64 0 obj (Leakage-Resilient Private Key Encryption Using Key Proxies) endobj 65 0 obj << /S /GoTo /D (subsubsection.E.2.1) >> endobj 68 0 obj (Construction) endobj 69 0 obj << /S /GoTo /D (subsubsection.E.2.2) >> endobj 72 0 obj (Single Invocation Leakage Model) endobj 73 0 obj << /S /GoTo /D (subsubsection.E.2.3) >> endobj 76 0 obj (Security Analysis) endobj 77 0 obj << /S /GoTo /D (appendix.F) >> endobj 80 0 obj (Application: Chosen Ciphertext Secure Public Key Encryption) endobj 81 0 obj << /S /GoTo /D [82 0 R /Fit ] >> endobj 84 0 obj << /Length 2496 /Filter /FlateDecode >> stream xڝ]sݿB*[ӗ^o.iҞv: