The generic construction of continuous leakage-resilient identity-based cryptosystems
From MaRDI portal
Publication:2632014
DOI10.1016/J.TCS.2018.11.019zbMATH Open1439.94078OpenAlexW2902696716WikidataQ115036497 ScholiaQ115036497MaRDI QIDQ2632014FDOQ2632014
Authors: Yanwei Zhou, Bo Yang, Yi Mu
Publication date: 17 May 2019
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2018.11.019
Recommendations
- Novel updatable identity-based hash proof system and its applications
- Continuous leakage-resilient identity-based encryption with leakage amplification
- Identity-based encryption resilient to continual auxiliary leakage
- Updatable hash proof system and its applications
- Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
chosen ciphertext attacksidentity-based cryptosystemidentity-based hash proof systemcontinuous leakage-resilience
Cites Work
- Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing
- Efficient public-key cryptography in the presence of key leakage
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Title not available (Why is that?)
- Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks
- Identity-based encryption resilient to continual auxiliary leakage
- Achieving leakage resilience through dual system encryption
- Signature schemes with bounded leakage resilience
- Leakage-resilient cryptography from minimal assumptions
- Public-Key Cryptosystems Resilient to Key Leakage
- Public-key encryption in the bounded-retrieval model
- Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
- Advances in Cryptology - EUROCRYPT 2004
- Key-policy attribute-based encryption against continual auxiliary input leakage
- Generic transformation to strongly existentially unforgeable signature schemes with continuous leakage resiliency
- Identity-based broadcast encryption with continuous leakage resilience
- Securing computation against continuous leakage
- Continuous After-the-Fact Leakage-Resilient Key Exchange
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Provably secure certificate-based encryption with leakage resilience
- Strongly leakage-resilient authenticated key exchange
- Updatable hash proof system and its applications
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Anonymous Identity-Based Hash Proof System and Its Applications
Cited In (7)
- Novel generic construction of leakage-resilient PKE scheme with CCA security
- Novel updatable identity-based hash proof system and its applications
- Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
- Leakage-resilient identity-based cryptography from minimal assumptions
- Identity-based encryption resilient to continual auxiliary leakage
- Continuous leakage-resilient identity-based encryption with leakage amplification
- Updatable hash proof system and its applications
This page was built for publication: The generic construction of continuous leakage-resilient identity-based cryptosystems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2632014)