Achieving Leakage Resilience through Dual System Encryption

From MaRDI portal
Publication:3000533

DOI10.1007/978-3-642-19571-6_6zbMath1291.94118OpenAlexW1871488407MaRDI QIDQ3000533

Allison Lewko, Brent Waters, Yannis Rouselakis

Publication date: 19 May 2011

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_6




Related Items (36)

Signature schemes secure against hard-to-invert leakageMemory leakage-resilient secret sharing schemesHow to Compute in the Presence of LeakageThe generic construction of continuous leakage-resilient identity-based cryptosystemsBilinear Entropy Expansion from the Decisional Linear AssumptionRegular lossy functions and their applications in leakage-resilient cryptographyAdaptive-secure identity-based inner-product functional encryption and its leakage-resilienceABE with improved auxiliary input for big data securityA general framework for secure sharing of personal health records in cloud systemAnonymous and leakage resilient IBE and IPEThreshold public key encryption scheme resilient against continual leakage without random oraclesKey continual-leakage resilient broadcast cryptosystem from dual system in broadcast networksStrongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard AssumptionsLeakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from latticesIBE with incompressible master secret and small identity secretsIdentity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear AssumptionLeakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled CircuitsProvably secure certificate-based encryption with leakage resilienceKey-policy attribute-based encryption against continual auxiliary input leakageLeakage-resilient cryptography from puncturable primitives and obfuscationHierarchical attribute based encryption with continuous leakage-resilienceEfficient identity-based encryption with hierarchical key-insulation from HIBELeakage-resilient attribute based encryption in prime-order groups via predicate encodingsContinuous leakage-resilient certificate-based signcryption scheme and application in cloud computingAnonymous HIBE with short ciphertexts: full security in prime order groupsPost-challenge leakage in public-key encryptionContinuous leakage-resilient certificate-based encryptionNovel updatable identity-based hash proof system and its applicationsLeakage-Resilient Hierarchical Identity-Based Encryption with Recipient AnonymityLeakage-Resilient Functional Encryption via Pair EncodingsDeterministic Public-Key Encryption Under Continual LeakageContinuous leakage-resilient identity-based encryption with leakage amplificationBlack-box constructions of signature schemes in the bounded leakage settingIdentity-based broadcast encryption with continuous leakage resilienceLeakage-resilient key exchange and two-seed extractorsDon't tamper with dual system encryption. Beyond polynomial related-key security of IBE




This page was built for publication: Achieving Leakage Resilience through Dual System Encryption