Journal ArticleDOI
Leakage-resilient identity-based encryption scheme
Sujuan Li,Futai Zhang +1 more
Reads0
Chats0
TLDR
The semantic security of the proposed leakage-resilient Identity-Based Encryption IBE scheme is proved in two ways in the random oracle model under the Decisional Square Bilinear Diffie-Hellman D-Square-BDH assumption.Abstract:
We propose a leakage-resilient Identity-Based Encryption IBE scheme in the relative leakage mode. The semantic security of the proposed scheme is proved in two ways in the random oracle model under the Decisional Square Bilinear Diffie-Hellman D-Square-BDH assumption. Compared with some existing leakage-resilient IBE schemes, our construction enjoys a shorter parameter length, a lower computation cost and a higher ratio of the key leakage for the same level of security.read more
Citations
More filters
Journal ArticleDOI
Provably secure identity‐based encryption resilient to post‐challenge continuous auxiliary input leakage
TL;DR: An identity-based encryption scheme resilient to leakage under composite order groups and secure against post-challenge continuous auxiliary input, adaptive chosen-identity, and adaptive chosen plaintext attacks under three static assumptions in the standard model is presented.
Journal ArticleDOI
Continuous leakage-resilient certificate-based encryption
TL;DR: A continuous leakage-resilient security model of certificate-based encryption which is resilient to continuous leakage, and it is secure against adaptive chosen ciphertext attacks under the bilinear Diffie-Hellman inversion (BDHI) hardness assumption.
Journal ArticleDOI
Efficient and secure big data storage system with leakage resilience in cloud computing
TL;DR: This paper proposes an efficient and secure big data storage system in cloud computing, in which a leakage-resilient encryption scheme serves as the main ingredient and indicates that the leakage ratio in the scheme can reach roughly 1/3 and is higher than other schemes.
Journal ArticleDOI
Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles
Journal ArticleDOI
Provably leakage-resilient three-party password-based authenticated key exchange
Ou Ruan,Qingping Wang,Zihao Wang +2 more
TL;DR: A continuous after-the-fact LR eCK-security model for 3PAke is defined and a LR 3PAKE protocol is proposed, then a formal security proof in the standard model is presented.
References
More filters
Book ChapterDOI
Identity-based cryptosystems and signature schemes
TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Book ChapterDOI
Differential Power Analysis
TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Proceedings ArticleDOI
On lattices, learning with errors, random linear codes, and cryptography
TL;DR: A public-key cryptosystem whose hardness is based on the worst-case quantum hardness of SVP and SIVP, and an efficient solution to the learning problem implies a quantum, which can be made classical.
Proceedings ArticleDOI
Trapdoors for hard lattices and new cryptographic constructions
TL;DR: In this article, the authors show how to construct a variety of "trapdoor" cryptographic tools assuming the worst-case hardness of standard lattice problems (such as approximating the length of the shortest nonzero vector to within certain polynomial factors).
Journal ArticleDOI
On lattices, learning with errors, random linear codes, and cryptography
TL;DR: A (classical) public-key cryptosystem whose security is based on the hardness of the learning problem, which is a reduction from worst-case lattice problems such as GapSVP and SIVP to a certain learning problem that is quantum.