Pages that link to "Item:Q3000533"
From MaRDI portal
The following pages link to Achieving Leakage Resilience through Dual System Encryption (Q3000533):
Displaying 36 items.
- Signature schemes secure against hard-to-invert leakage (Q290397) (← links)
- Black-box constructions of signature schemes in the bounded leakage setting (Q781055) (← links)
- Identity-based broadcast encryption with continuous leakage resilience (Q781856) (← links)
- Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks (Q893862) (← links)
- Regular lossy functions and their applications in leakage-resilient cryptography (Q1643156) (← links)
- Provably secure certificate-based encryption with leakage resilience (Q1698724) (← links)
- Leakage-resilient cryptography from puncturable primitives and obfuscation (Q1710617) (← links)
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings (Q1752551) (← links)
- Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing (Q1998834) (← links)
- Leakage-resilient key exchange and two-seed extractors (Q2096493) (← links)
- Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE (Q2096618) (← links)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience (Q2152060) (← links)
- Key-policy attribute-based encryption against continual auxiliary input leakage (Q2200658) (← links)
- Hierarchical attribute based encryption with continuous leakage-resilience (Q2213099) (← links)
- Efficient identity-based encryption with hierarchical key-insulation from HIBE (Q2232128) (← links)
- Anonymous HIBE with short ciphertexts: full security in prime order groups (Q2256104) (← links)
- Post-challenge leakage in public-key encryption (Q2257289) (← links)
- Continuous leakage-resilient certificate-based encryption (Q2279532) (← links)
- Novel updatable identity-based hash proof system and its applications (Q2283028) (← links)
- Continuous leakage-resilient identity-based encryption with leakage amplification (Q2324786) (← links)
- ABE with improved auxiliary input for big data security (Q2402348) (← links)
- A general framework for secure sharing of personal health records in cloud system (Q2403233) (← links)
- Anonymous and leakage resilient IBE and IPE (Q2407713) (← links)
- Threshold public key encryption scheme resilient against continual leakage without random oracles (Q2418660) (← links)
- The generic construction of continuous leakage-resilient identity-based cryptosystems (Q2632014) (← links)
- Leakage-Resilient Functional Encryption via Pair Encodings (Q2817484) (← links)
- Deterministic Public-Key Encryption Under Continual Leakage (Q2822678) (← links)
- How to Compute in the Presence of Leakage (Q3449567) (← links)
- Bilinear Entropy Expansion from the Decisional Linear Assumption (Q3457083) (← links)
- Memory leakage-resilient secret sharing schemes (Q5046490) (← links)
- Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity (Q5205023) (← links)
- Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions (Q6108851) (← links)
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices (Q6113953) (← links)
- IBE with incompressible master secret and small identity secrets (Q6114253) (← links)
- Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption (Q6162382) (← links)
- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits (Q6163656) (← links)