CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not $$\mathtt {q}$$ -type) Assumptions
From MaRDI portal
Publication:6488926
DOI10.1007/978-3-030-26834-3_1MaRDI QIDQ6488926
Wakaha Ogata, Kaoru Kurosawa, Toi Tomita
Publication date: 14 March 2024
Cites Work
- Unnamed Item
- Unnamed Item
- Pairings for cryptographers
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Efficient functional encryption for inner-product values with full-hiding security
- An Algebraic Framework for Diffie-Hellman Assumptions
- Leakage Resilient IBE and IPE under the DLIN Assumption
- Identity-Based Cryptosystems and Signature Schemes
- Achieving Leakage Resilience through Dual System Encryption
- After-the-Fact Leakage in Public-Key Encryption
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Public-Key Encryption in the Bounded-Retrieval Model
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- Security Analysis of the Strong Diffie-Hellman Problem
- Programmable Hash Functions and Their Applications
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Signature Schemes with Bounded Leakage Resilience
- Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
- On cryptography with auxiliary input
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters
- Efficient Leakage-Resilient Identity-Based Encryption with CCA Security
- Public-Key Cryptosystems Resilient to Key Leakage
This page was built for publication: CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not $$\mathtt {q}$$ -type) Assumptions