Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
DOI10.1016/J.TCS.2019.12.018zbMATH Open1448.94238OpenAlexW2998327391WikidataQ115036476 ScholiaQ115036476MaRDI QIDQ2290636FDOQ2290636
Authors: Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang, Yi Mu
Publication date: 29 January 2020
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2019.12.018
Recommendations
- Efficient leakage-resilient identity-based encryption with CCA security
- Continuous leakage-resilient identity-based encryption with leakage amplification
- Novel generic construction of leakage-resilient PKE scheme with CCA security
- Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption
- Chosen‐Ciphertext Security from Identity‐Based Encryption
identity-based encryptionleakage resiliencegeneric constructionCCA securityidentity-based hash proof system
Cites Work
- Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing
- Public Key Encryption against Related Key Attacks
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Title not available (Why is that?)
- Title not available (Why is that?)
- Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- One-time signatures and chameleon hash functions
- Public-Key Cryptosystems Resilient to Key Leakage
- Public-key encryption in the bounded-retrieval model
- Advances in Cryptology - EUROCRYPT 2004
- Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing
- Hierarchical attribute based encryption with continuous leakage-resilience
- Continuous leakage-resilient certificate-based encryption
- Identity-based broadcast encryption with continuous leakage resilience
- Regularly lossy functions and applications
- Regular lossy functions and their applications in leakage-resilient cryptography
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Leakage-flexible CCA-secure public-key encryption: simple construction and free of pairing
- Provably secure certificate-based encryption with leakage resilience
- Strongly leakage-resilient authenticated key exchange
- Leakage-resilient ring signature schemes
- Updatable hash proof system and its applications
- The generic construction of continuous leakage-resilient identity-based cryptosystems
- ABE with improved auxiliary input for big data security
- Anonymous Identity-Based Hash Proof System and Its Applications
- Continuous leakage-resilient identity-based encryption with leakage amplification
Cited In (12)
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption
- Novel generic construction of leakage-resilient PKE scheme with CCA security
- Novel updatable identity-based hash proof system and its applications
- Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio
- Leakage-resilient identity-based cryptography from minimal assumptions
- Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
- Efficient leakage-resilient identity-based encryption with CCA security
- The generic construction of continuous leakage-resilient identity-based cryptosystems
- CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not $$\mathtt {q}$$ -type) Assumptions
- Continuous leakage-resilient identity-based encryption with leakage amplification
- Advances in Cryptology - EUROCRYPT 2004
This page was built for publication: Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2290636)