Key-policy attribute-based encryption against continual auxiliary input leakage
From MaRDI portal
Publication:2200658
DOI10.1016/j.ins.2018.07.077zbMath1441.68032OpenAlexW2888094362WikidataQ122199484 ScholiaQ122199484MaRDI QIDQ2200658
Jian Shen, Jiguo Li, Qihong Yu, Yi-Chen Zhang
Publication date: 22 September 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2018.07.077
dual system encryptionkey-policy attribute-based encryptioncontinual auxiliary input leakagestatic assumptions
Related Items (10)
The generic construction of continuous leakage-resilient identity-based cryptosystems ⋮ PRTA: a proxy re-encryption based trusted authorization scheme for nodes on CloudIoT ⋮ Adaptively secure certificate-based broadcast encryption and its application to cloud storage service ⋮ Leakage-resilient identity-based cryptography from minimal assumptions ⋮ An efficient identity-based signature scheme with provable security ⋮ Key escrow-free attribute based encryption with user revocation ⋮ Hierarchical attribute based encryption with continuous leakage-resilience ⋮ (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance ⋮ Flexible attribute-based proxy re-encryption for efficient data sharing ⋮ A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation
Cites Work
- Leakage-resilient cryptography from minimal assumptions
- Identity-based broadcast encryption with continuous leakage resilience
- Provably secure certificate-based encryption with leakage resilience
- Anonymous certificate-based broadcast encryption with constant decryption cost
- Continuous leakage-resilient certificate-based encryption
- Identity-Based Encryption Resilient to Continual Auxiliary Leakage
- Achieving Leakage Resilience through Dual System Encryption
- Unbounded HIBE and Attribute-Based Encryption
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Public-Key Encryption Schemes with Auxiliary Inputs
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Multi-authority Attribute Based Encryption
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks
- Fuzzy Identity-Based Encryption
- Theory of Cryptography
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
This page was built for publication: Key-policy attribute-based encryption against continual auxiliary input leakage