Anonymous and leakage resilient IBE and IPE
From MaRDI portal
Publication:2407713
DOI10.1007/s10623-016-0303-7zbMath1379.68118OpenAlexW2549537796MaRDI QIDQ2407713
Le Trieu Phong, Kaoru Kurosawa
Publication date: 6 October 2017
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-016-0303-7
Related Items
Efficient and secure big data storage system with leakage resilience in cloud computing, Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Programmable hash functions and their applications
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
- Short signatures from the Weil pairing
- Continuous leakage-resilient certificate-based encryption
- Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption
- Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier
- Leakage Resilient IBE and IPE under the DLIN Assumption
- Identity-Based Encryption Resilient to Continual Auxiliary Leakage
- Identity-Based Cryptosystems and Signature Schemes
- Achieving Leakage Resilience through Dual System Encryption
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Functional Encryption for Inner Product Predicates from Learning with Errors
- Public-Key Encryption Schemes with Auxiliary Inputs
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Public-Key Encryption in the Bounded-Retrieval Model
- Bonsai Trees, or How to Delegate a Lattice Basis
- Efficient Lattice (H)IBE in the Standard Model
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Survey: Leakage Resilience and the Bounded Retrieval Model
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- How to leak on key updates
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Storing Secrets on Continually Leaky Devices
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography