2019
DOI: 10.1016/j.ins.2019.01.052
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical attribute based encryption with continuous leakage-resilience

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 96 publications
(42 citation statements)
references
References 21 publications
0
39
0
Order By: Relevance
“…Authors gave the formal definition and security model of hierarchical attribute-based encryption (HABE) with continuous leakage-resilience in [32]. They presented a ciphertext-policy HABE scheme with continuous leakageresilience.…”
Section: Attribute-based Encryptionmentioning
confidence: 99%
“…Authors gave the formal definition and security model of hierarchical attribute-based encryption (HABE) with continuous leakage-resilience in [32]. They presented a ciphertext-policy HABE scheme with continuous leakageresilience.…”
Section: Attribute-based Encryptionmentioning
confidence: 99%
“…If the key is leaked, every address being randomized from that key could be calculated. The key management can be further secured with advanced leakage-resilience key policies [45], [46].…”
Section: B Linux Implementationmentioning
confidence: 99%
“…In order to improve efficiency, Emura et al [28] presented a CP-ABE scheme with constant ciphertext size. Many ABE schemes [29][30][31][32][33][34][35][36][37][38] were presented in various application domains, such as ABE with outsourced data decryption [29,30,37], ABE with efficient attribute revocation [31], ABE with full verifiability [30], ABE with keyword search function [29,31], traceable ABE [32,33], ABE with leakage resilience [34][35][36], auditable ABE [38], etc. In order to solve key escrow problem, Li et al [39,40] presented two certificate-based encryption schemes with leakage resilience.…”
Section: Related Workmentioning
confidence: 99%