Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
From MaRDI portal
Publication:6113953
DOI10.1007/978-3-030-97131-1_8zbMath1519.94151OpenAlexW4214668590MaRDI QIDQ6113953
Qiqi Lai, Zhedong Wang, Feng-Hao Liu
Publication date: 10 August 2023
Published in: Public-Key Cryptography – PKC 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-97131-1_8
Cites Work
- Unnamed Item
- Unnamed Item
- Advances in cryptology -- CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19--23, 2012. Proceedings
- Advances in cryptology -- CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16--20, 2009. Proceedings
- Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9--11, 2010. Proceedings
- Advances in cryptology -- EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 -- June 3, 2010. Proceedings
- Anonymous IBE, leakage resilience and circular security from new assumptions
- Randomness is linear in space
- Fully secure attribute-based encryption for \(t\)-CNF from LWE
- Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio
- Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24--26, 2014. Proceedings
- Extended Nested Dual System Groups, Revisited
- Riding on Asymmetry: Efficient ABE for Branching Programs
- Functional Encryption with Bounded Collusions via Multi-party Computation
- Tamper and Leakage Resilience in the Split-State Model
- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
- Achieving Leakage Resilience through Dual System Encryption
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Functional Encryption for Inner Product Predicates from Learning with Errors
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Public-Key Encryption Schemes with Auxiliary Inputs
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Public-Key Encryption in the Bounded-Retrieval Model
- Efficient Lattice (H)IBE in the Standard Model
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Leakage-Resilient Cryptography from Minimal Assumptions
- Fuzzy Identity-Based Encryption
- Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits
- Advances in Cryptology - CRYPTO 2003
- Continuous Non-malleable Codes
- Dual System Encryption via Predicate Encodings
- On Forward-Secure Storage
- Public-Key Cryptosystems Resilient to Key Leakage