Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity
From MaRDI portal
Publication:5205023
DOI10.1142/S0129054119400197zbMath1427.68072OpenAlexW2953740845WikidataQ123193519 ScholiaQ123193519MaRDI QIDQ5205023
Menglei Yang, Tian-Tian Zhang, Fang Ren, Dong Zheng, Rui Guo, Ying-Hui Zhang
Publication date: 10 December 2019
Published in: International Journal of Foundations of Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1142/s0129054119400197
Cites Work
- Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15--17, 2009. Proceedings
- Differentially private naive Bayes learning over multiple data sources
- Anonymous HIBE with short ciphertexts: full security in prime order groups
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
- Anonymous and leakage resilient IBE and IPE
- Leakage-Resilient Public-Key Encryption from Obfuscation
- Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience
- Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
- Achieving Leakage Resilience through Dual System Encryption
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-Resilient Signatures
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Public-Key Encryption in the Bounded-Retrieval Model
- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Signature Schemes with Bounded Leakage Resilience
- Anonymous Identity-Based Hash Proof System and Its Applications
- Public-Key Cryptosystems Resilient to Key Leakage
This page was built for publication: Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity