Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing
From MaRDI portal
Publication:1679904
DOI10.1016/j.ipl.2017.09.012zbMath1422.94034OpenAlexW2759215600WikidataQ123357390 ScholiaQ123357390MaRDI QIDQ1679904
Publication date: 22 November 2017
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2017.09.012
Related Items
Leakage-resilient identity-based cryptography from minimal assumptions ⋮ Certificateless encryption scheme with provable security in the standard model suitable for mobile devices ⋮ Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing ⋮ Novel updatable identity-based hash proof system and its applications ⋮ Identity-based encryption with leakage-amplified chosen-ciphertext attacks security ⋮ Continuous leakage-resilient identity-based encryption with leakage amplification ⋮ Anonymous certificateless multi-receiver encryption scheme for smart community management systems
Cites Work
- Unnamed Item
- Unnamed Item
- Provably secure certificate-based encryption with leakage resilience
- Strongly Leakage-Resilient Authenticated Key Exchange
- Identity-Based Cryptosystems and Signature Schemes
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks
- Public-Key Cryptosystems Resilient to Key Leakage
- Advances in Cryptology - ASIACRYPT 2003
This page was built for publication: Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing