Identity-based broadcast encryption with continuous leakage resilience
Tài liệu tham khảo
Akavia, 2009, Simultaneous hardcore bits and cryptography against memory attacks, 474
Alwen, 2010, Public-key encryption in the bounded-retrieval model, 113
Baek, 2005, Efficient multi-receiver identity-based encryption and its application to broadcast encryption, 380
Bellare, 2011, Identity-based encryption secure against selective opening attack, 235
Boneh, 2005, Collusion resistant broadcast encryption with short ciphertexts and private keys, 258
Boneh, 2005, Evaluating 2-dnf formulas on ciphertexts, 325
Boneh, 2008, Generalized identity based and broadcast encryption schemes, 455
Boneh, 2014, Low overhead broadcast encryption from multilinear maps, 206
Brakerski, 2010, Overcoming the hole in the bucket: Public-key cryptography resilient to continual memory leakage, 501
Brumley, 2005, Remote timing attacks are practical, Comput. Networks, 48, 701, 10.1016/j.comnet.2005.01.010
Caro, 2011, jpbc: Java pairing based cryptography, 850
Chen, 2013, Improving timing attack on rsa-crt via error detection and correction strategy, Inf. Sci. (Ny), 232, 464, 10.1016/j.ins.2012.01.027
Chow, 2010, Practical leakage-resilient identity-based encryption from simple assumptions, 152
Delerablee, 2007, Identity-based broadcast encryption with constant size ciphertexts and private keys, 200
Dodis, 2010, Public-key encryption schemes with auxiliary inputs, 361
Dodis, 2010, Cryptography against continuous memory attacks, 511
Dodis, 2011, Storing secrets on continually leaky devices, 688
Fiat, 1993, Broadcast encryption, 480
Gentry, 2009, Adaptive security in broadcast encryption systems (with short ciphertexts), 171
Goldwasser, 2010, Securing computation against continuous leakage, 59
Guo, 2017, Provably secure certificate-based encryption with leakage resilience, Theor. Comput. Sci.
Guo, 2016, Hierarchical attribute-based encryption with continuous auxiliary inputs leakage, Securi. Commun. Netw., 9, 4852, 10.1002/sec.1659
Halderman, 2009, Lest we remember: cold-boot attacks on encryption keys, Commun. ACM, 52, 91, 10.1145/1506409.1506429
Ishai, 2003, Private circuits: Securing hardware against probing attacks, 463
Juma, 2010, Protecting cryptographic keys against continual leakage, 41
Katz, 2009, Signature schemes with bounded leakage resilience, 703
Kiltz, 2010, Leakage resilient elgamal encryption, 595
Kim, 2015, Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext, IEEE Trans. Inf. Forensics Secur., 10, 679, 10.1109/TIFS.2014.2388156
Lewko, 2011, Achieving leakage resilience through dual system encryption, 70
Lewko, 2010, New techniques for dual system encryption and fully secure hibe with short ciphertexts, 455
Li, 2016, Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage, Secur. Commun. Netw., 9, 1016, 10.1002/sec.1396
Li, 2016, Continuous leakage-resilient certificate-based encryption, Inf. Sci. (Ny), 355, 1
Li, 2016, A leakage-resilient cca-secure identity-based encryption scheme, Comput. J., 59, 1066, 10.1093/comjnl/bxv128
Libert, 2012, Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model, 206
Malek, 2012, Adaptively secure broadcast encryption with short ciphertexts., IJ Netw.Secur., 14, 71
Naor, 2012, Public-key cryptosystems resilient to key leakage, SIAM J. Comput., 41, 772, 10.1137/100813464
Nguyen, 2013, Leakage-resilience of stateless/stateful public-key encryption from hash proofs, IEICE Trans. Fundam. Electron., Commun. Comput. Sci., 96, 1100, 10.1587/transfun.E96.A.1100
Waters, 2009, Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions, 619
Xiong, 2013, Leakage-resilient certificateless public key encryption, 13
Xiong, 2012, Continual leakage-resilient dynamic secret sharing in the split-state model, 119
Yu, 2015, Leakage-resilient certificate-based encryption, Security and Communication Networks, 8, 3346, 10.1002/sec.1258
Yu, 2016, Certificate-based encryption resilient to key leakage, J. Syst. Softw., 116, 101, 10.1016/j.jss.2015.05.066
Zhang, 2012, Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups, Math. Comput. Model., 55, 12, 10.1016/j.mcm.2011.01.004
Zhang, 2015, Leakage-resilient anonymous identity-based broadcast encryption in the standard model, 201
Zhang, 2011, Adaptively secure identity-based encryption in the anonymous communications, ICIC Expr. Lett., 5, 3209
Zhang, 2013, Efficient and adaptively secure broadcast encryption systems, Secur. Commun. Netw., 6, 1044, 10.1002/sec.678