Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority
From MaRDI portal
Publication:5069706
DOI10.15388/22-INFOR474zbMath1487.68099OpenAlexW4206944443WikidataQ121769880 ScholiaQ121769880MaRDI QIDQ5069706
Tung-Tso Tsai, Sen-Shan Huang, Yun-Hsin Chuang, Ying-Hao Hung, Yuh-Min Tseng
Publication date: 19 April 2022
Published in: Informatica (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.15388/22-infor474
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing
- Leakage-Resilient Symmetric Encryption via Re-keying
- Identity-Based Encryption Resilient to Continual Auxiliary Leakage
- Leakage Resilient ElGamal Encryption
- On the Efficient Implementation of Pairing-Based Protocols
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- A Practical Leakage-Resilient Signature Scheme in the Generic Group Model
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Signature Schemes with Bounded Leakage Resilience
- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks
- Leakage-Resilient Cryptography from Minimal Assumptions
- Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation Authority
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Public-Key Cryptosystems Resilient to Key Leakage
- Public-Key Cryptosystems Resilient to Key Leakage
- Advances in Cryptology - ASIACRYPT 2003
This page was built for publication: Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority