Hierarchical attribute based encryption with continuous leakage-resilience
From MaRDI portal
Recommendations
- Key-policy attribute-based encryption against continual auxiliary input leakage
- ADR-lrABE: new mechanism of direct-revocable attribute-based encryption with continual-leakage tolerances
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
- New Model and Construction of ABE: Achieving Key Resilient-Leakage and Attribute Direct-Revocation
- Attribute-Based Encryption Resilient to Auxiliary Input
Cites work
- Achieving leakage resilience through dual system encryption
- An efficient key-policy attribute-based searchable encryption in prime-order groups
- Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- Decentralizing attribute-based encryption
- Fully leakage-resilient signatures
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- Fuzzy Identity-Based Encryption
- Identity-based broadcast encryption with continuous leakage resilience
- Improving timing attack on RSA-CRT via error detection and correction strategy
- Key-policy attribute-based encryption against continual auxiliary input leakage
- Leakage resilient ElGamal encryption
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Protecting cryptographic keys against continual leakage
- Provably secure certificate-based encryption with leakage resilience
- Public-key cryptosystems resilient to key leakage
- Public-key encryption schemes with auxiliary inputs
- Signature schemes with bounded leakage resilience
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Storing Secrets on Continually Leaky Devices
- Theory of Cryptography
- Theory of Cryptography
- Topics in Cryptology – CT-RSA 2006
- Unbounded HIBE and Attribute-Based Encryption
Cited in
(16)- Key-policy attribute-based encryption against continual auxiliary input leakage
- An efficient identity-based signature scheme with provable security
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
- ABE with improved auxiliary input for big data security
- A survey on functional encryption
- (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance
- Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
- Key escrow-free attribute based encryption with user revocation
- Leakage-resilient identity-based cryptography from minimal assumptions
- Adaptively secure certificate-based broadcast encryption and its application to cloud storage service
- Flexible attribute-based proxy re-encryption for efficient data sharing
- Hierarchical and non-monotonic key-policy attribute-based encryption and its application
- scientific article; zbMATH DE number 6402469 (Why is no real title available?)
- A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation
- ADR-lrABE: new mechanism of direct-revocable attribute-based encryption with continual-leakage tolerances
- Leakage-resilient attribute-based encryption with attribute-hiding
This page was built for publication: Hierarchical attribute based encryption with continuous leakage-resilience
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2213099)