2015
DOI: 10.1002/sec.1258
|View full text |Cite
|
Sign up to set email alerts
|

Leakage‐resilient certificate‐based encryption

Abstract: Certificate-based encryption is a new cryptography primitive, which can be used to construct efficient public key infrastructure. However, side-channel attacks are not considered in certificate-based encryption. In order to capture these attacks, we formalize security model of certificate-based encryption with leakage resilience. Furthermore, we present a leakage-resilient certificate-based encryption (LR-CBE) scheme. To the best of our knowledge, this is the first LR-CBE scheme. Based on decision bilinear Dif… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 34 publications
(13 citation statements)
references
References 45 publications
0
11
0
Order By: Relevance
“…In Sun et al (2015), they present the first leakage-resilient wicked identity-based encryption (wicked IBE) scheme. Yu et al (2015) present a leakage-resilient certificate-based encryption (LR-CBE) scheme with the relative leakage ratio almost amounts to 1.…”
Section: Related Workmentioning
confidence: 99%
“…In Sun et al (2015), they present the first leakage-resilient wicked identity-based encryption (wicked IBE) scheme. Yu et al (2015) present a leakage-resilient certificate-based encryption (LR-CBE) scheme with the relative leakage ratio almost amounts to 1.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, leakage‐resilient cryptography schemes are important to meet the security requirements in the real world. However, most previous leakage‐resilient cryptography schemes [1–13] only consider the bounded leakage attacks and do not allow any continuous leakage. In the real world, the leakage is unbounded, because of the adversary can continuously learn some additional information on the private key of the user, and can trivially break the security of cryptography scheme under the continuous leakage attacks.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, CBC also addresses the key escrow and distribution problems. In recent years, CBC has attracted much attention in academic circle and a lot of cryptographic schemes [19][20][21][22][23][24][25][26][27][28][29][30][31][32][33][34][35][36] (includeing many certificate-based encryption (CBE) and certificate-based signature (CBS) schemes) have been proposed.…”
Section: Introductionmentioning
confidence: 99%