Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
From MaRDI portal
Publication:6544463
DOI10.1007/S10623-024-01358-1zbMATH Open1540.9407MaRDI QIDQ6544463FDOQ6544463
Authors: Qiqi Lai, Feng-Hao Liu, Zhedong Wang
Publication date: 27 May 2024
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Cites Work
- Public-key cryptosystems from the worst-case shortest vector problem
- On lattices, learning with errors, random linear codes, and cryptography
- Functional encryption for inner product predicates from learning with errors
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Title not available (Why is that?)
- Fuzzy Identity-Based Encryption
- Classical hardness of learning with errors
- Achieving leakage resilience through dual system encryption
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Public-key encryption schemes with auxiliary inputs
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Leakage-Resilient Cryptography from Minimal Assumptions
- Public-Key Cryptosystems Resilient to Key Leakage
- Advances in Cryptology - CRYPTO 2003
- Trapdoors for lattices: simpler, tighter, faster, smaller
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
- Randomness is linear in space
- Public-key encryption in the bounded-retrieval model
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Title not available (Why is that?)
- Tamper and Leakage Resilience in the Split-State Model
- Functional encryption with bounded collusions via multi-party computation
- Pseudorandomness
- Generating shorter bases for hard random lattices
- On Forward-Secure Storage
- Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits
- Dual System Encryption via Predicate Encodings
- Anonymous IBE, leakage resilience and circular security from new assumptions
- Extended Nested Dual System Groups, Revisited
- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
- Fully secure attribute-based encryption for \(t\)-CNF from LWE
- Riding on Asymmetry: Efficient ABE for Branching Programs
- Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
This page was built for publication: Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6544463)