Provably secure certificate-based encryption with leakage resilience
From MaRDI portal
Publication:1698724
DOI10.1016/j.tcs.2017.10.020zbMath1386.68051OpenAlexW2772185092WikidataQ115036512 ScholiaQ115036512MaRDI QIDQ1698724
Jiguo Li, Yuyan Guo, Yang Lu, Yi-Chen Zhang, Fu-Tai Zhang
Publication date: 16 February 2018
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2017.10.020
Related Items
The generic construction of continuous leakage-resilient identity-based cryptosystems ⋮ Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing ⋮ Anonymous certificate-based broadcast encryption with constant decryption cost ⋮ Key-policy attribute-based encryption against continual auxiliary input leakage ⋮ Hierarchical attribute based encryption with continuous leakage-resilience ⋮ Novel updatable identity-based hash proof system and its applications ⋮ Novel generic construction of leakage-resilient PKE scheme with CCA security ⋮ Identity-based encryption with leakage-amplified chosen-ciphertext attacks security ⋮ Continuous leakage-resilient identity-based encryption with leakage amplification
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Provably secure certificate-based signature scheme without pairings
- Distributed public key schemes secure against continual leakage
- Identity-Based Cryptosystems and Signature Schemes
- Achieving Leakage Resilience through Dual System Encryption
- Signatures Resilient to Continual Leakage on Memory and Computation
- Leakage-Resilient Cryptography from the Inner-Product Extractor
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Efficient Certificate-Based Encryption in the Standard Model
- Public-Key Encryption in the Bounded-Retrieval Model
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks
- Survey: Leakage Resilience and the Bounded Retrieval Model
- On cryptography with auxiliary input
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Multiparty computation secure against continual memory leakage
- Certificateless Encryption Schemes Strongly Secure in the Standard Model
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
- Advances in Cryptology - ASIACRYPT 2003