2016
DOI: 10.1016/j.jss.2015.05.066
|View full text |Cite
|
Sign up to set email alerts
|

Certificate-based encryption resilient to key leakage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 43 publications
(19 citation statements)
references
References 11 publications
0
19
0
Order By: Relevance
“…Based on certificate-based public-key settings, little work addresses the design of leakage-resilient certificate-based encryption (LR-CBE) or leakage-resilient certificate-based key encapsulation (LR-CB-KE) schemes. In 2016, the first LR-CBE scheme was proposed by Yu et al [33]. In their LR-CBE scheme, adversaries are allowed to gain partial information of both the CA's system secret key in the certificate generation phase and the user's private key and certificate in the decryption phase.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on certificate-based public-key settings, little work addresses the design of leakage-resilient certificate-based encryption (LR-CBE) or leakage-resilient certificate-based key encapsulation (LR-CB-KE) schemes. In 2016, the first LR-CBE scheme was proposed by Yu et al [33]. In their LR-CBE scheme, adversaries are allowed to gain partial information of both the CA's system secret key in the certificate generation phase and the user's private key and certificate in the decryption phase.…”
Section: A Related Workmentioning
confidence: 99%
“…According to the review above, the leakage models of these existing LR-CBE schemes [33], [34], [35] have several restrictions and do not offer complete leakage abilities of adversaries. In this paper, we first present a new continuous leakage model of LR-CB-KE schemes.…”
Section: B Contribution and Organizationmentioning
confidence: 99%
“…In addition, CBC also addresses the key escrow and distribution problems. In recent years, CBC has attracted much attention in academic circle and a lot of cryptographic schemes [19][20][21][22][23][24][25][26][27][28][29][30][31][32][33][34][35][36] (includeing many certificate-based encryption (CBE) and certificate-based signature (CBS) schemes) have been proposed.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, Li et al provided a provably secure identity‐based encryption resilient to post‐challenge continuous auxiliary inputs leakage. In order to solve key escrow problem in IBE, Yu et al presented leakage‐resilient certificate‐based encryption scheme.…”
Section: Introductionmentioning
confidence: 99%