The generic construction of continuous leakage-resilient identity-based cryptosystems
From MaRDI portal
Publication:2632014
Recommendations
- Novel updatable identity-based hash proof system and its applications
- Continuous leakage-resilient identity-based encryption with leakage amplification
- Identity-based encryption resilient to continual auxiliary leakage
- Updatable hash proof system and its applications
- Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
Cites work
- scientific article; zbMATH DE number 2086698 (Why is no real title available?)
- Achieving leakage resilience through dual system encryption
- Advances in Cryptology - EUROCRYPT 2004
- Anonymous Identity-Based Hash Proof System and Its Applications
- Continuous After-the-Fact Leakage-Resilient Key Exchange
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks
- Efficient public-key cryptography in the presence of key leakage
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Generic transformation to strongly existentially unforgeable signature schemes with continuous leakage resiliency
- Identity-based broadcast encryption with continuous leakage resilience
- Identity-based encryption resilient to continual auxiliary leakage
- Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
- Key-policy attribute-based encryption against continual auxiliary input leakage
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Leakage-resilient cryptography from minimal assumptions
- Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing
- Provably secure certificate-based encryption with leakage resilience
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Public-Key Cryptosystems Resilient to Key Leakage
- Public-key encryption in the bounded-retrieval model
- Securing computation against continuous leakage
- Signature schemes with bounded leakage resilience
- Strongly leakage-resilient authenticated key exchange
- Updatable hash proof system and its applications
Cited in
(7)- Updatable hash proof system and its applications
- Novel generic construction of leakage-resilient PKE scheme with CCA security
- Novel updatable identity-based hash proof system and its applications
- Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
- Leakage-resilient identity-based cryptography from minimal assumptions
- Identity-based encryption resilient to continual auxiliary leakage
- Continuous leakage-resilient identity-based encryption with leakage amplification
This page was built for publication: The generic construction of continuous leakage-resilient identity-based cryptosystems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2632014)