Leakage-resilient identity-based cryptography from minimal assumptions
From MaRDI portal
Publication:6063141
DOI10.1007/s10623-023-01268-8zbMath1526.94046OpenAlexW4385877061MaRDI QIDQ6063141
Yi Mu, Bo Yang, Mingwu Zhang, Yanwei Zhou, Zirui Qiao, Zhe Xia
Publication date: 7 November 2023
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-023-01268-8
public-key encryptionidentity-based encryptionidentity-based hash proof system(continuous) leakage resilience
Cites Work
- Unnamed Item
- Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing
- Identity-based broadcast encryption with continuous leakage resilience
- Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
- Novel generic construction of leakage-resilient PKE scheme with CCA security
- Key-policy attribute-based encryption against continual auxiliary input leakage
- Hierarchical attribute based encryption with continuous leakage-resilience
- Continuous leakage-resilient certificate-based encryption
- The generic construction of continuous leakage-resilient identity-based cryptosystems
- Strongly Leakage-Resilient Authenticated Key Exchange
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Identity-Based Encryption Resilient to Continual Auxiliary Leakage
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Public-Key Encryption in the Bounded-Retrieval Model
- Practical Identity-Based Encryption Without Random Oracles
- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks
- Leakage-Resilient Cryptography from Minimal Assumptions
- Updatable Hash Proof System and Its Applications
- Efficient Identity-Based Encryption Without Random Oracles
- Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
- Public-Key Cryptosystems Resilient to Key Leakage
This page was built for publication: Leakage-resilient identity-based cryptography from minimal assumptions