The generic construction of continuous leakage-resilient identity-based cryptosystems
From MaRDI portal
Publication:2632014
DOI10.1016/J.TCS.2018.11.019zbMATH Open1439.94078OpenAlexW2902696716WikidataQ115036497 ScholiaQ115036497MaRDI QIDQ2632014FDOQ2632014
Publication date: 17 May 2019
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2018.11.019
Recommendations
- Novel updatable identity-based hash proof system and its applications
- Continuous leakage-resilient identity-based encryption with leakage amplification
- Identity-based encryption resilient to continual auxiliary leakage
- Updatable hash proof system and its applications
- Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
chosen ciphertext attacksidentity-based cryptosystemidentity-based hash proof systemcontinuous leakage-resilience
Cites Work
- Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Title not available (Why is that?)
- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks
- Identity-Based Encryption Resilient to Continual Auxiliary Leakage
- Achieving Leakage Resilience through Dual System Encryption
- Signature schemes with bounded leakage resilience
- Leakage-Resilient Cryptography from Minimal Assumptions
- Public-Key Cryptosystems Resilient to Key Leakage
- Public-Key Encryption in the Bounded-Retrieval Model
- Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
- Advances in Cryptology - EUROCRYPT 2004
- Key-policy attribute-based encryption against continual auxiliary input leakage
- Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency
- Identity-based broadcast encryption with continuous leakage resilience
- Securing Computation against Continuous Leakage
- Continuous After-the-Fact Leakage-Resilient Key Exchange
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Provably secure certificate-based encryption with leakage resilience
- Strongly Leakage-Resilient Authenticated Key Exchange
- Updatable Hash Proof System and Its Applications
- Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Anonymous Identity-Based Hash Proof System and Its Applications
Cited In (4)
This page was built for publication: The generic construction of continuous leakage-resilient identity-based cryptosystems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2632014)