Threshold public key encryption scheme resilient against continual leakage without random oracles
From MaRDI portal
Publication:2418660
DOI10.1007/s11704-013-3051-0zbMath1426.94141OpenAlexW2021574383WikidataQ123263843 ScholiaQ123263843MaRDI QIDQ2418660
Wenzheng Zhang, Chunxiang Xu, Xiujie Zhang, Wanpeng Li
Publication date: 28 May 2019
Published in: Frontiers of Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11704-013-3051-0
standard modelleakage-resilientadaptive chosen ciphertext securitycontinual leakagethreshold public key encryption
Cites Work
- Unnamed Item
- Distributed public key schemes secure against continual leakage
- Achieving Leakage Resilience through Dual System Encryption
- Adaptively Secure Non-interactive Threshold Cryptosystems
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
- How to leak on key updates
- Storing Secrets on Continually Leaky Devices
- Theory of Cryptography
- Public-Key Cryptosystems Resilient to Key Leakage
- Topics in Cryptology – CT-RSA 2006
- Theory of Cryptography
This page was built for publication: Threshold public key encryption scheme resilient against continual leakage without random oracles