Identity-based broadcast encryption with continuous leakage resilience

Information Sciences - Tập 429 - Trang 177-193 - 2018
Jiguo Li1, Qihong Yu1,2, Yichen Zhang1
1College of Computer and Information, Hohai University, Nanjing, 211100, China
2School of Computer Science, Suqian College, Suqian 223800, China

Tài liệu tham khảo

Akavia, 2009, Simultaneous hardcore bits and cryptography against memory attacks, 474 Alwen, 2010, Public-key encryption in the bounded-retrieval model, 113 Baek, 2005, Efficient multi-receiver identity-based encryption and its application to broadcast encryption, 380 Bellare, 2011, Identity-based encryption secure against selective opening attack, 235 Boneh, 2005, Collusion resistant broadcast encryption with short ciphertexts and private keys, 258 Boneh, 2005, Evaluating 2-dnf formulas on ciphertexts, 325 Boneh, 2008, Generalized identity based and broadcast encryption schemes, 455 Boneh, 2014, Low overhead broadcast encryption from multilinear maps, 206 Brakerski, 2010, Overcoming the hole in the bucket: Public-key cryptography resilient to continual memory leakage, 501 Brumley, 2005, Remote timing attacks are practical, Comput. Networks, 48, 701, 10.1016/j.comnet.2005.01.010 Caro, 2011, jpbc: Java pairing based cryptography, 850 Chen, 2013, Improving timing attack on rsa-crt via error detection and correction strategy, Inf. Sci. (Ny), 232, 464, 10.1016/j.ins.2012.01.027 Chow, 2010, Practical leakage-resilient identity-based encryption from simple assumptions, 152 Delerablee, 2007, Identity-based broadcast encryption with constant size ciphertexts and private keys, 200 Dodis, 2010, Public-key encryption schemes with auxiliary inputs, 361 Dodis, 2010, Cryptography against continuous memory attacks, 511 Dodis, 2011, Storing secrets on continually leaky devices, 688 Fiat, 1993, Broadcast encryption, 480 Gentry, 2009, Adaptive security in broadcast encryption systems (with short ciphertexts), 171 Goldwasser, 2010, Securing computation against continuous leakage, 59 Guo, 2017, Provably secure certificate-based encryption with leakage resilience, Theor. Comput. Sci. Guo, 2016, Hierarchical attribute-based encryption with continuous auxiliary inputs leakage, Securi. Commun. Netw., 9, 4852, 10.1002/sec.1659 Halderman, 2009, Lest we remember: cold-boot attacks on encryption keys, Commun. ACM, 52, 91, 10.1145/1506409.1506429 Ishai, 2003, Private circuits: Securing hardware against probing attacks, 463 Juma, 2010, Protecting cryptographic keys against continual leakage, 41 Katz, 2009, Signature schemes with bounded leakage resilience, 703 Kiltz, 2010, Leakage resilient elgamal encryption, 595 Kim, 2015, Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext, IEEE Trans. Inf. Forensics Secur., 10, 679, 10.1109/TIFS.2014.2388156 Lewko, 2011, Achieving leakage resilience through dual system encryption, 70 Lewko, 2010, New techniques for dual system encryption and fully secure hibe with short ciphertexts, 455 Li, 2016, Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage, Secur. Commun. Netw., 9, 1016, 10.1002/sec.1396 Li, 2016, Continuous leakage-resilient certificate-based encryption, Inf. Sci. (Ny), 355, 1 Li, 2016, A leakage-resilient cca-secure identity-based encryption scheme, Comput. J., 59, 1066, 10.1093/comjnl/bxv128 Libert, 2012, Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model, 206 Malek, 2012, Adaptively secure broadcast encryption with short ciphertexts., IJ Netw.Secur., 14, 71 Naor, 2012, Public-key cryptosystems resilient to key leakage, SIAM J. Comput., 41, 772, 10.1137/100813464 Nguyen, 2013, Leakage-resilience of stateless/stateful public-key encryption from hash proofs, IEICE Trans. Fundam. Electron., Commun. Comput. Sci., 96, 1100, 10.1587/transfun.E96.A.1100 Waters, 2009, Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions, 619 Xiong, 2013, Leakage-resilient certificateless public key encryption, 13 Xiong, 2012, Continual leakage-resilient dynamic secret sharing in the split-state model, 119 Yu, 2015, Leakage-resilient certificate-based encryption, Security and Communication Networks, 8, 3346, 10.1002/sec.1258 Yu, 2016, Certificate-based encryption resilient to key leakage, J. Syst. Softw., 116, 101, 10.1016/j.jss.2015.05.066 Zhang, 2012, Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups, Math. Comput. Model., 55, 12, 10.1016/j.mcm.2011.01.004 Zhang, 2015, Leakage-resilient anonymous identity-based broadcast encryption in the standard model, 201 Zhang, 2011, Adaptively secure identity-based encryption in the anonymous communications, ICIC Expr. Lett., 5, 3209 Zhang, 2013, Efficient and adaptively secure broadcast encryption systems, Secur. Commun. Netw., 6, 1044, 10.1002/sec.678