Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks
From MaRDI portal
Publication:4910227
DOI10.1007/978-3-642-36095-4_6zbMath1312.94071OpenAlexW115846804MaRDI QIDQ4910227
Jian Weng, Shengli Liu, Yunlei Zhao
Publication date: 18 March 2013
Published in: Topics in Cryptology – CT-RSA 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-36095-4_6
Related Items (17)
Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing ⋮ The generic construction of continuous leakage-resilient identity-based cryptosystems ⋮ Regular lossy functions and their applications in leakage-resilient cryptography ⋮ Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority ⋮ Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing ⋮ Leakage-resilient identity-based cryptography from minimal assumptions ⋮ Public-key encryption scheme with optimal continuous leakage resilience ⋮ Provably secure certificate-based encryption with leakage resilience ⋮ Key-policy attribute-based encryption against continual auxiliary input leakage ⋮ Leakage-resilient cryptography from puncturable primitives and obfuscation ⋮ Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation ⋮ Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing ⋮ Continuous leakage-resilient certificate-based encryption ⋮ Novel updatable identity-based hash proof system and its applications ⋮ Novel generic construction of leakage-resilient PKE scheme with CCA security ⋮ Identity-based encryption with leakage-amplified chosen-ciphertext attacks security ⋮ Continuous leakage-resilient identity-based encryption with leakage amplification
This page was built for publication: Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks