Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing
From MaRDI portal
Publication:1998834
DOI10.1016/J.TCS.2021.01.024zbMath1497.68164OpenAlexW3125996690MaRDI QIDQ1998834
Publication date: 9 March 2021
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2021.01.024
Data encryption (aspects in computer science) (68P25) Distributed systems (68M14) Internet topics (68M11)
Related Items (2)
Public-key encryption scheme with optimal continuous leakage resilience ⋮ Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing
- Certificate-based signcryption with enhanced security features
- Provable secure identity based generalized signcryption scheme
- Identity-based broadcast encryption with continuous leakage resilience
- Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing
- Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model
- Strongly leakage resilient authenticated key exchange, revisited
- Strong authenticated key exchange with auxiliary inputs
- Strongly Leakage-Resilient Authenticated Key Exchange
- Security Proofs for Signature Schemes
- Identity-Based Cryptosystems and Signature Schemes
- Achieving Leakage Resilience through Dual System Encryption
- Fully Leakage-Resilient Signatures
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Public-Key Encryption in the Bounded-Retrieval Model
- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks
This page was built for publication: Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing