Identity-based broadcast encryption with continuous leakage resilience
From MaRDI portal
Publication:781856
DOI10.1016/j.ins.2017.11.008zbMath1436.94080OpenAlexW2767713621WikidataQ123333433 ScholiaQ123333433MaRDI QIDQ781856
Jiguo Li, Qihong Yu, Yi-Chen Zhang
Publication date: 20 July 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2017.11.008
Related Items (14)
Efficient and secure big data storage system with leakage resilience in cloud computing ⋮ The generic construction of continuous leakage-resilient identity-based cryptosystems ⋮ Adaptively secure certificate-based broadcast encryption and its application to cloud storage service ⋮ Leakage-resilient identity-based cryptography from minimal assumptions ⋮ An efficient identity-based signature scheme with provable security ⋮ Anonymous certificate-based broadcast encryption with constant decryption cost ⋮ Key-policy attribute-based encryption against continual auxiliary input leakage ⋮ Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters ⋮ Hierarchical attribute based encryption with continuous leakage-resilience ⋮ Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing ⋮ Novel updatable identity-based hash proof system and its applications ⋮ Identity-based encryption with leakage-amplified chosen-ciphertext attacks security ⋮ Continuous leakage-resilient identity-based encryption with leakage amplification ⋮ Anonymous certificateless multi-receiver encryption scheme for smart community management systems
Uses Software
Cites Work
- Unnamed Item
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
- Continuous leakage-resilient certificate-based encryption
- Improving timing attack on RSA-CRT via error detection and correction strategy
- Low Overhead Broadcast Encryption from Multilinear Maps
- Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
- Achieving Leakage Resilience through Dual System Encryption
- Identity-Based Encryption Secure against Selective Opening Attack
- Leakage Resilient ElGamal Encryption
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Public-Key Encryption Schemes with Auxiliary Inputs
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Public-Key Encryption in the Bounded-Retrieval Model
- Protecting Cryptographic Keys against Continual Leakage
- Securing Computation against Continuous Leakage
- Generalized Identity Based and Broadcast Encryption Schemes
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Signature Schemes with Bounded Leakage Resilience
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Advances in Cryptology - CRYPTO 2003
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Storing Secrets on Continually Leaky Devices
- Public Key Cryptography - PKC 2005
- Theory of Cryptography
- Public-Key Cryptosystems Resilient to Key Leakage
This page was built for publication: Identity-based broadcast encryption with continuous leakage resilience