Continuous leakage-resilient certificate-based encryption
From MaRDI portal
Publication:2279532
Recommendations
- Provably secure certificate-based encryption with leakage resilience
- Leakage-resilient certificateless key encapsulation scheme
- Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing
- Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing
- Continuous leakage-resilient identity-based encryption with leakage amplification
Cites work
- scientific article; zbMATH DE number 2009961 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- A leakage-resilient pairing-based variant of the Schnorr signature scheme
- Achieving leakage resilience through dual system encryption
- Continuous After-the-Fact Leakage-Resilient Key Exchange
- Cryptography and Coding
- Efficient Certificate-Based Encryption in the Standard Model
- Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks
- IRIBE: intrusion-resilient identity-based encryption
- Identity-based encryption resilient to continual auxiliary leakage
- Interactive proofs under continual memory leakage
- Leakage resilient ElGamal encryption
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-resilient cryptography from the inner-product extractor
- Leakage-tolerant computation with input-independent preprocessing
- Multiparty computation secure against continual memory leakage
- On continual leakage of discrete log representations
- On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives
- Provably secure certificate-based signature scheme without pairings
- Public-Key Cryptosystems Resilient to Key Leakage
- Public-key encryption in the bounded-retrieval model
- Public-key encryption schemes with auxiliary inputs
- Randomness is linear in space
- Secure integration of asymmetric and symmetric encryption schemes
- Signatures resilient to continual leakage on memory and computation
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Theory of Cryptography
Cited in
(16)- A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model
- Continuous leakage-resilient identity-based encryption with leakage amplification
- Thwarting side-channel analysis against RSA cryptosystems with additive blinding
- Identity-based broadcast encryption with continuous leakage resilience
- Notes on a provably-secure certificate-based encryption against malicious CA attacks
- Novel updatable identity-based hash proof system and its applications
- Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
- Continuous After-the-Fact Leakage-Resilient Key Exchange
- Leakage-resilient certificateless key encapsulation scheme
- Anonymous and leakage resilient IBE and IPE
- Deterministic Public-Key Encryption Under Continual Leakage
- Provably secure certificate-based encryption with leakage resilience
- Leakage-resilient identity-based cryptography from minimal assumptions
- Anonymous certificate-based broadcast encryption with constant decryption cost
- Key-policy attribute-based encryption against continual auxiliary input leakage
- Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing
This page was built for publication: Continuous leakage-resilient certificate-based encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2279532)