Identity-Based Encryption Resilient to Continual Auxiliary Leakage

From MaRDI portal
Publication:2894404

DOI10.1007/978-3-642-29011-4_9zbMath1297.94114OpenAlexW2117459578MaRDI QIDQ2894404

Ye Zhang, Tsz Hon Yuen, Sherman S. M. Chow, Siu-Ming Yiu

Publication date: 29 June 2012

Published in: Advances in Cryptology – EUROCRYPT 2012 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-29011-4_9




Related Items (21)

Signature schemes secure against hard-to-invert leakageMemory leakage-resilient secret sharing schemesThe generic construction of continuous leakage-resilient identity-based cryptosystemsAdaptive-secure identity-based inner-product functional encryption and its leakage-resilienceLeakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation AuthorityABE with improved auxiliary input for big data securityPublic key encryption resilient to leakage and tampering attacksAnonymous and leakage resilient IBE and IPELeakage-resilient identity-based cryptography from minimal assumptionsTowards Proofs of Ownership Beyond Bounded LeakageStrongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard AssumptionsIdentity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear AssumptionKey-policy attribute-based encryption against continual auxiliary input leakageLeakage-resilient cryptography from puncturable primitives and obfuscationLeakage-resilient attribute based encryption in prime-order groups via predicate encodingsPost-challenge leakage in public-key encryptionContinuous leakage-resilient certificate-based encryptionLeakage-Resilient Functional Encryption via Pair EncodingsSignatures Resilient to Uninvertible LeakageContinuous leakage-resilient identity-based encryption with leakage amplificationDon't tamper with dual system encryption. Beyond polynomial related-key security of IBE






This page was built for publication: Identity-Based Encryption Resilient to Continual Auxiliary Leakage