Achieving leakage resilience through dual system encryption
From MaRDI portal
Publication:3000533
Recommendations
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks
- Public-key cryptosystems resilient to key leakage
- Leakage-resilient functional encryption via pair encodings
- Leakage-resilient cryptography from the inner-product extractor
Cited in
(41)- Key-policy attribute-based encryption against continual auxiliary input leakage
- Hierarchical attribute based encryption with continuous leakage-resilience
- Continuous leakage-resilient certificate-based encryption
- Efficient identity-based encryption with hierarchical key-insulation from HIBE
- Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing
- How to Compute in the Presence of Leakage
- Signature schemes secure against hard-to-invert leakage
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
- Deterministic Public-Key Encryption Under Continual Leakage
- Leakage-resilient functional encryption via pair encodings
- ABE with improved auxiliary input for big data security
- Regular lossy functions and their applications in leakage-resilient cryptography
- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits
- Post-challenge leakage in public-key encryption
- Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption
- Anonymous and leakage resilient IBE and IPE
- Bilinear entropy expansion from the decisional linear assumption
- Leakage-resilient key exchange and two-seed extractors
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience
- Novel updatable identity-based hash proof system and its applications
- Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks
- LR-UESDE: a continual-leakage resilient encryption with unbounded extensible set delegation
- The generic construction of continuous leakage-resilient identity-based cryptosystems
- Leakage-resilient hierarchical identity-based encryption with recipient anonymity
- Black-box constructions of signature schemes in the bounded leakage setting
- Identity-based broadcast encryption with continuous leakage resilience
- Expanded Framework for Dual System Encryption and Its Application
- Provably secure certificate-based encryption with leakage resilience
- CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not $$\mathtt {q}$$ -type) Assumptions
- Memory leakage-resilient secret sharing schemes
- Leakage-resilient cryptography from puncturable primitives and obfuscation
- Continuous leakage-resilient identity-based encryption with leakage amplification
- A general framework for secure sharing of personal health records in cloud system
- IBE with incompressible master secret and small identity secrets
- Anonymous HIBE with short ciphertexts: full security in prime order groups
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
- Threshold public key encryption scheme resilient against continual leakage without random oracles
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
- Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions
- Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE
- Leakage-resilient attribute-based encryption with attribute-hiding
This page was built for publication: Achieving leakage resilience through dual system encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3000533)