Pages that link to "Item:Q2894404"
From MaRDI portal
The following pages link to Identity-Based Encryption Resilient to Continual Auxiliary Leakage (Q2894404):
Displaying 25 items.
- Signature schemes secure against hard-to-invert leakage (Q290397) (← links)
- Identity-based broadcast encryption with continuous leakage resilience (Q781856) (← links)
- Leakage-resilient cryptography from puncturable primitives and obfuscation (Q1710617) (← links)
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings (Q1752551) (← links)
- Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE (Q2096618) (← links)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience (Q2152060) (← links)
- Key-policy attribute-based encryption against continual auxiliary input leakage (Q2200658) (← links)
- Post-challenge leakage in public-key encryption (Q2257289) (← links)
- Continuous leakage-resilient certificate-based encryption (Q2279532) (← links)
- Novel updatable identity-based hash proof system and its applications (Q2283028) (← links)
- Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio (Q2289217) (← links)
- Continuous leakage-resilient identity-based encryption with leakage amplification (Q2324786) (← links)
- ABE with improved auxiliary input for big data security (Q2402348) (← links)
- Public key encryption resilient to leakage and tampering attacks (Q2402358) (← links)
- Anonymous and leakage resilient IBE and IPE (Q2407713) (← links)
- The generic construction of continuous leakage-resilient identity-based cryptosystems (Q2632014) (← links)
- Leakage-Resilient Functional Encryption via Pair Encodings (Q2817484) (← links)
- Signatures Resilient to Uninvertible Leakage (Q2827729) (← links)
- Towards Proofs of Ownership Beyond Bounded Leakage (Q2953871) (← links)
- Memory leakage-resilient secret sharing schemes (Q5046490) (← links)
- Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority (Q5069706) (← links)
- Leakage-resilient identity-based cryptography from minimal assumptions (Q6063141) (← links)
- Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions (Q6108851) (← links)
- Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption (Q6162382) (← links)
- Leakage-resilient attribute-based encryption with attribute-hiding (Q6547896) (← links)