Novel updatable identity-based hash proof system and its applications
From MaRDI portal
Publication:2283028
DOI10.1016/J.TCS.2019.10.031zbMath1455.94202OpenAlexW2985261078WikidataQ126853116 ScholiaQ126853116MaRDI QIDQ2283028
Tao Wang, Bo Yang, Yanwei Zhou, Yi Mu
Publication date: 27 December 2019
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2019.10.031
identity-based cryptographyidentity-based hash proof systemcontinuous leakage resilienceDBDH assumption
Related Items (3)
Public-key encryption scheme with optimal continuous leakage resilience ⋮ Novel updatable identity-based hash proof system and its applications ⋮ Novel generic construction of leakage-resilient PKE scheme with CCA security
Cites Work
- Unnamed Item
- Unnamed Item
- Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing
- Identity-based broadcast encryption with continuous leakage resilience
- Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing
- Provably secure certificate-based encryption with leakage resilience
- Continuous leakage-resilient certificate-based encryption
- Novel updatable identity-based hash proof system and its applications
- The generic construction of continuous leakage-resilient identity-based cryptosystems
- Strongly Leakage-Resilient Authenticated Key Exchange
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Achieving Leakage Resilience through Dual System Encryption
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Trapdoors for hard lattices and new cryptographic constructions
- Public-Key Encryption in the Bounded-Retrieval Model
- Practical Identity-Based Encryption Without Random Oracles
- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks
- Updatable Hash Proof System and Its Applications
- Anonymous Identity-Based Hash Proof System and Its Applications
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Public-Key Cryptosystems Resilient to Key Leakage
- On lattices, learning with errors, random linear codes, and cryptography
This page was built for publication: Novel updatable identity-based hash proof system and its applications