Achieving Leakage Resilience through Dual System Encryption
From MaRDI portal
Publication:3000533
DOI10.1007/978-3-642-19571-6_6zbMath1291.94118OpenAlexW1871488407MaRDI QIDQ3000533
Allison Lewko, Brent Waters, Yannis Rouselakis
Publication date: 19 May 2011
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_6
Related Items (36)
Signature schemes secure against hard-to-invert leakage ⋮ Memory leakage-resilient secret sharing schemes ⋮ How to Compute in the Presence of Leakage ⋮ The generic construction of continuous leakage-resilient identity-based cryptosystems ⋮ Bilinear Entropy Expansion from the Decisional Linear Assumption ⋮ Regular lossy functions and their applications in leakage-resilient cryptography ⋮ Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience ⋮ ABE with improved auxiliary input for big data security ⋮ A general framework for secure sharing of personal health records in cloud system ⋮ Anonymous and leakage resilient IBE and IPE ⋮ Threshold public key encryption scheme resilient against continual leakage without random oracles ⋮ Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks ⋮ Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions ⋮ Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices ⋮ IBE with incompressible master secret and small identity secrets ⋮ Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption ⋮ Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits ⋮ Provably secure certificate-based encryption with leakage resilience ⋮ Key-policy attribute-based encryption against continual auxiliary input leakage ⋮ Leakage-resilient cryptography from puncturable primitives and obfuscation ⋮ Hierarchical attribute based encryption with continuous leakage-resilience ⋮ Efficient identity-based encryption with hierarchical key-insulation from HIBE ⋮ Leakage-resilient attribute based encryption in prime-order groups via predicate encodings ⋮ Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing ⋮ Anonymous HIBE with short ciphertexts: full security in prime order groups ⋮ Post-challenge leakage in public-key encryption ⋮ Continuous leakage-resilient certificate-based encryption ⋮ Novel updatable identity-based hash proof system and its applications ⋮ Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity ⋮ Leakage-Resilient Functional Encryption via Pair Encodings ⋮ Deterministic Public-Key Encryption Under Continual Leakage ⋮ Continuous leakage-resilient identity-based encryption with leakage amplification ⋮ Black-box constructions of signature schemes in the bounded leakage setting ⋮ Identity-based broadcast encryption with continuous leakage resilience ⋮ Leakage-resilient key exchange and two-seed extractors ⋮ Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE
This page was built for publication: Achieving Leakage Resilience through Dual System Encryption