Continuous leakage-resilient certificateless public key encryption with CCA security
暂无分享,去创建一个
Bo Yang | Yanwei Zhou | Bo Yang | Yanwei Zhou | Yan-wei Zhou
[1] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[2] Bo Yang,et al. Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security , 2017, Comput. J..
[3] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[4] Siu-Ming Yiu,et al. Leakage-resilient certificateless public key encryption , 2013, AsiaPKC '13.
[5] Jiguo Li,et al. A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme , 2016, Comput. J..
[6] Kefei Chen,et al. Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience , 2015, IET Inf. Secur..
[7] Fuchun Guo,et al. Strong authenticated key exchange with auxiliary inputs , 2016, Designs, Codes and Cryptography.
[8] Yang Lu,et al. Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage , 2016, Secur. Commun. Networks.
[9] Fuchun Guo,et al. Strongly Leakage-Resilient Authenticated Key Exchange , 2016, CT-RSA.
[10] Yunlei Zhao,et al. Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks , 2013, CT-RSA.
[11] Yang Lu,et al. Continuous leakage-resilient certificate-based encryption , 2016, Inf. Sci..
[12] Brent Waters,et al. Practical leakage-resilient identity-based encryption from simple assumptions , 2010, CCS '10.
[13] Yi Mu,et al. CCA2 secure public-key encryption scheme tolerating continual leakage attacks , 2016, Secur. Commun. Networks.
[14] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..
[15] Yevgeniy Dodis,et al. Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model , 2009, CRYPTO.
[16] Vinod Vaikuntanathan,et al. Simultaneous Hardcore Bits and Cryptography against Memory Attacks , 2009, TCC.
[17] Moni Naor,et al. Public-Key Cryptosystems Resilient to Key Leakage , 2009, SIAM J. Comput..
[18] Yevgeniy Dodis,et al. Cryptography against Continuous Memory Attacks , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[19] Bo Yang,et al. Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing , 2016, Discret. Appl. Math..
[20] Limin Shen,et al. Efficient leakage-resilient public key encryption from DDH assumption , 2013, Cluster Computing.
[21] Kaoru Kurosawa,et al. New leakage-resilient CCA-secure public key encryption , 2013, J. Math. Cryptol..
[22] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[23] Xinyi Huang,et al. Certificate-based encryption resilient to key leakage , 2016, J. Syst. Softw..