2018
DOI: 10.1016/j.tcs.2017.10.020
|View full text |Cite
|
Sign up to set email alerts
|

Provably secure certificate-based encryption with leakage resilience

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 28 publications
(15 citation statements)
references
References 12 publications
0
15
0
Order By: Relevance
“…Therefore, it is challenging for us in the future to design more efficient anonymous IBBE schemes in virtue of prime order bilinear groups, which can achieve CCA2 security directly. Besides, the construction of anonymous IBBE schemes with leakage resilience [51,52] is another interesting issue.…”
Section: Resultsmentioning
confidence: 99%
“…Therefore, it is challenging for us in the future to design more efficient anonymous IBBE schemes in virtue of prime order bilinear groups, which can achieve CCA2 security directly. Besides, the construction of anonymous IBBE schemes with leakage resilience [51,52] is another interesting issue.…”
Section: Resultsmentioning
confidence: 99%
“…However, the performance of Yu et al's scheme is costly due to the dual system encryption technique. In 2018, Guo et al [34] proposed an efficient LR-CBE scheme, but it only allows adversaries to gain partial information of both the user's private key and certificate in the bounded leakage model. In the continuous leakage model, Li et al [35] proposed a new LR-CBE scheme.…”
Section: A Related Workmentioning
confidence: 99%
“…According to the review above, the leakage models of these existing LR-CBE schemes [33], [34], [35] have several restrictions and do not offer complete leakage abilities of adversaries. In this paper, we first present a new continuous leakage model of LR-CB-KE schemes.…”
Section: B Contribution and Organizationmentioning
confidence: 99%
See 1 more Smart Citation
“…Many ABE schemes [29][30][31][32][33][34][35][36][37][38] were presented in various application domains, such as ABE with outsourced data decryption [29,30,37], ABE with efficient attribute revocation [31], ABE with full verifiability [30], ABE with keyword search function [29,31], traceable ABE [32,33], ABE with leakage resilience [34][35][36], auditable ABE [38], etc. In order to solve key escrow problem, Li et al [39,40] presented two certificate-based encryption schemes with leakage resilience. ABE schemes have wide application in cloud storage [41,42], mobile social networks [43] and smart grid [44].…”
Section: Related Workmentioning
confidence: 99%