Continuous leakage-resilient certificate-based encryption
DOI10.1016/J.INS.2016.03.032zbMATH Open1427.68070OpenAlexW2307477252WikidataQ123300301 ScholiaQ123300301MaRDI QIDQ2279532FDOQ2279532
Authors: Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Futai Zhang, Yi-Chen Zhang
Publication date: 13 December 2019
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2016.03.032
Recommendations
- Provably secure certificate-based encryption with leakage resilience
- Leakage-resilient certificateless key encapsulation scheme
- Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing
- Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing
- Continuous leakage-resilient identity-based encryption with leakage amplification
side channel attackscertificate-based encryptionbilinear Diffie-Hellman inversion assumptioncontinuous leakage-resilient
Cites Work
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Title not available (Why is that?)
- Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks
- Secure integration of asymmetric and symmetric encryption schemes
- Cryptography and Coding
- Identity-based encryption resilient to continual auxiliary leakage
- Achieving leakage resilience through dual system encryption
- Signatures resilient to continual leakage on memory and computation
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Public-key encryption schemes with auxiliary inputs
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
- Randomness is linear in space
- Leakage-resilient cryptography from the inner-product extractor
- Public-key encryption in the bounded-retrieval model
- Title not available (Why is that?)
- IRIBE: intrusion-resilient identity-based encryption
- On continual leakage of discrete log representations
- Provably secure certificate-based signature scheme without pairings
- On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives
- Multiparty computation secure against continual memory leakage
- Leakage resilient ElGamal encryption
- Continuous After-the-Fact Leakage-Resilient Key Exchange
- Efficient Certificate-Based Encryption in the Standard Model
- Leakage-tolerant computation with input-independent preprocessing
- Interactive proofs under continual memory leakage
- A leakage-resilient pairing-based variant of the Schnorr signature scheme
Cited In (16)
- Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing
- A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model
- Deterministic Public-Key Encryption Under Continual Leakage
- Leakage-resilient certificateless key encapsulation scheme
- Continuous After-the-Fact Leakage-Resilient Key Exchange
- Anonymous and leakage resilient IBE and IPE
- Novel updatable identity-based hash proof system and its applications
- Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
- Leakage-resilient identity-based cryptography from minimal assumptions
- Thwarting side-channel analysis against RSA cryptosystems with additive blinding
- Identity-based broadcast encryption with continuous leakage resilience
- Provably secure certificate-based encryption with leakage resilience
- Continuous leakage-resilient identity-based encryption with leakage amplification
- Notes on a provably-secure certificate-based encryption against malicious CA attacks
- Anonymous certificate-based broadcast encryption with constant decryption cost
- Key-policy attribute-based encryption against continual auxiliary input leakage
This page was built for publication: Continuous leakage-resilient certificate-based encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2279532)