Anonymous and Updatable Identity-Based Hash Proof System
暂无分享,去创建一个
Yi Mu | Zhe Xia | Tao Wang | Yanwei Zhou | Bo Yang | Y. Mu | Zhe Xia | Bo Yang | Tao Wang | Yan-wei Zhou
[1] Yi Mu,et al. CCA2 secure public-key encryption scheme tolerating continual leakage attacks , 2016, Secur. Commun. Networks.
[2] Dongdai Lin,et al. Anonymous Identity-Based Hash Proof System and Its Applications , 2012, ProvSec.
[3] Yang Lu,et al. Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage , 2016, Secur. Commun. Networks.
[4] Rui Zhang,et al. Updatable Hash Proof System and Its Applications , 2015, ESORICS.
[5] Yi Mu,et al. Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles , 2018, Comput. J..
[6] Bo Yang,et al. Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security , 2017, Comput. J..
[7] Fuchun Guo,et al. Strongly Leakage-Resilient Authenticated Key Exchange , 2016, CT-RSA.
[8] Yang Lu,et al. Provably secure certificate-based encryption with leakage resilience , 2017, Theor. Comput. Sci..
[9] Yunlei Zhao,et al. Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks , 2013, CT-RSA.
[10] Ronald Cramer,et al. Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption , 2001, EUROCRYPT.
[11] Yang Lu,et al. Continuous leakage-resilient certificate-based encryption , 2016, Inf. Sci..
[12] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[13] Yanqin Zhu,et al. Leakage-resilient identity-based encryption scheme , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.
[14] Yevgeniy Dodis,et al. Cryptography against Continuous Memory Attacks , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[15] Moni Naor,et al. Public-Key Encryption in the Bounded-Retrieval Model , 2010, EUROCRYPT.
[16] Jiguo Li,et al. A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme , 2016, Comput. J..
[17] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[18] Shengli Liu,et al. Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing , 2014, Public Key Cryptography.
[19] Kefei Chen,et al. Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience , 2015, IET Inf. Secur..
[20] Brent Waters,et al. Practical leakage-resilient identity-based encryption from simple assumptions , 2010, CCS '10.
[21] Mihir Bellare,et al. Robust Encryption , 2010, TCC.
[22] Jiguo Li,et al. Leakage-resilient certificate-based encryption , 2015, Secur. Commun. Networks.
[23] A. Lewko,et al. Fully Secure HIBE with Short Ciphertexts , 2009 .
[24] Jiguo Li,et al. Identity-based broadcast encryption with continuous leakage resilience , 2018, Inf. Sci..
[25] Craig Gentry,et al. Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.
[26] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2009, JACM.
[27] Xinyi Huang,et al. Certificate-based encryption resilient to key leakage , 2016, J. Syst. Softw..
[28] Craig Gentry,et al. Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..
[29] Moni Naor,et al. Public-Key Cryptosystems Resilient to Key Leakage , 2009, SIAM J. Comput..
[30] Shengli Liu,et al. Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter , 2013, IACR Cryptol. ePrint Arch..
[31] M. Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2008, Journal of Cryptology.
[32] Patricia L. V. Ribeiro,et al. SPACE-EFFICIENT IDENTITY-BASED ENCRYPTION , 2009 .
[33] Zhong Chen,et al. A New Leakage-Resilient IBE Scheme in the Relative Leakage Model , 2011, DBSec.