Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing
From MaRDI portal
Publication:266836
DOI10.1016/j.dam.2015.10.018zbMath1338.94097OpenAlexW2175794387MaRDI QIDQ266836
Yanwei Zhou, Bo Yang, Wenzheng Zhang
Publication date: 7 April 2016
Published in: Discrete Applied Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.dam.2015.10.018
discrete logarithmcertificateless signcryptioncomputational Diffie-HellmanEUF-KL-CMAIND-KL-CCA2leakage-resilient
Related Items (9)
The generic construction of continuous leakage-resilient identity-based cryptosystems ⋮ Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority ⋮ Leakage-resilient identity-based cryptography from minimal assumptions ⋮ Public-key encryption scheme with optimal continuous leakage resilience ⋮ Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications ⋮ Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing ⋮ Novel updatable identity-based hash proof system and its applications ⋮ Novel generic construction of leakage-resilient PKE scheme with CCA security ⋮ Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Certificateless threshold ring signature
- Breaking the short certificateless signature scheme
- Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability
- Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing
- Identity-Based Cryptosystems and Signature Schemes
- Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks
- Information Security and Privacy
- Public-Key Cryptosystems Resilient to Key Leakage
- Cryptology and Network Security
- Public Key Cryptography - PKC 2006
- Advances in Cryptology - ASIACRYPT 2003
This page was built for publication: Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing