2016
DOI: 10.1016/j.ins.2016.03.032
|View full text |Cite
|
Sign up to set email alerts
|

Continuous leakage-resilient certificate-based encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(17 citation statements)
references
References 16 publications
0
17
0
Order By: Relevance
“…In 2018, Guo et al [34] proposed an efficient LR-CBE scheme, but it only allows adversaries to gain partial information of both the user's private key and certificate in the bounded leakage model. In the continuous leakage model, Li et al [35] proposed a new LR-CBE scheme. However, in their scheme, adversaries are allowed to gain only partial information of the user's private key and certificate, but random values involved in decryption phase and the CA's system secret key are disallowed to be leaked to adversaries.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2018, Guo et al [34] proposed an efficient LR-CBE scheme, but it only allows adversaries to gain partial information of both the user's private key and certificate in the bounded leakage model. In the continuous leakage model, Li et al [35] proposed a new LR-CBE scheme. However, in their scheme, adversaries are allowed to gain only partial information of the user's private key and certificate, but random values involved in decryption phase and the CA's system secret key are disallowed to be leaked to adversaries.…”
Section: A Related Workmentioning
confidence: 99%
“…According to the review above, the leakage models of these existing LR-CBE schemes [33], [34], [35] have several restrictions and do not offer complete leakage abilities of adversaries. In this paper, we first present a new continuous leakage model of LR-CB-KE schemes.…”
Section: B Contribution and Organizationmentioning
confidence: 99%
“…Many ABE schemes [29][30][31][32][33][34][35][36][37][38] were presented in various application domains, such as ABE with outsourced data decryption [29,30,37], ABE with efficient attribute revocation [31], ABE with full verifiability [30], ABE with keyword search function [29,31], traceable ABE [32,33], ABE with leakage resilience [34][35][36], auditable ABE [38], etc. In order to solve key escrow problem, Li et al [39,40] presented two certificate-based encryption schemes with leakage resilience. ABE schemes have wide application in cloud storage [41,42], mobile social networks [43] and smart grid [44].…”
Section: Related Workmentioning
confidence: 99%
“…In addition, CBC also addresses the key escrow and distribution problems. In recent years, CBC has attracted much attention in academic circle and a lot of cryptographic schemes [19][20][21][22][23][24][25][26][27][28][29][30][31][32][33][34][35][36] (includeing many certificate-based encryption (CBE) and certificate-based signature (CBS) schemes) have been proposed.…”
Section: Introductionmentioning
confidence: 99%