2019
DOI: 10.1049/iet-ifs.2018.5203
|View full text |Cite
|
Sign up to set email alerts
|

Identity‐based encryption resilient to continuous key leakage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 36 publications
(98 reference statements)
0
2
0
Order By: Relevance
“…In reference [25], a hierarchical attribute-based encryption scheme with continuous leakage-resilience is proposed. In [26], an identity-based secure scheme against continuous leakage is designed in the standard model. Based on the q-ABDHE assumption, they first propose a CLR-IBE scheme with CPA security in the standard model.…”
Section: Continuous Leakage Modelmentioning
confidence: 99%
“…In reference [25], a hierarchical attribute-based encryption scheme with continuous leakage-resilience is proposed. In [26], an identity-based secure scheme against continuous leakage is designed in the standard model. Based on the q-ABDHE assumption, they first propose a CLR-IBE scheme with CPA security in the standard model.…”
Section: Continuous Leakage Modelmentioning
confidence: 99%
“…In another word, the amount about revealed key information for a period is limited, while the amount about revealed key information is unlimited for the whole execution about the system. References [23][24] give the security schemes under this model.…”
Section: Related Workmentioning
confidence: 99%