scispace - formally typeset
Journal ArticleDOI

Leakage-resilient identity-based encryption scheme

Reads0
Chats0
TLDR
The semantic security of the proposed leakage-resilient Identity-Based Encryption IBE scheme is proved in two ways in the random oracle model under the Decisional Square Bilinear Diffie-Hellman D-Square-BDH assumption.
Abstract
We propose a leakage-resilient Identity-Based Encryption IBE scheme in the relative leakage mode. The semantic security of the proposed scheme is proved in two ways in the random oracle model under the Decisional Square Bilinear Diffie-Hellman D-Square-BDH assumption. Compared with some existing leakage-resilient IBE schemes, our construction enjoys a shorter parameter length, a lower computation cost and a higher ratio of the key leakage for the same level of security.

read more

Citations
More filters
Journal ArticleDOI

Provably secure identity‐based encryption resilient to post‐challenge continuous auxiliary input leakage

TL;DR: An identity-based encryption scheme resilient to leakage under composite order groups and secure against post-challenge continuous auxiliary input, adaptive chosen-identity, and adaptive chosen plaintext attacks under three static assumptions in the standard model is presented.
Journal ArticleDOI

Continuous leakage-resilient certificate-based encryption

TL;DR: A continuous leakage-resilient security model of certificate-based encryption which is resilient to continuous leakage, and it is secure against adaptive chosen ciphertext attacks under the bilinear Diffie-Hellman inversion (BDHI) hardness assumption.
Journal ArticleDOI

Efficient and secure big data storage system with leakage resilience in cloud computing

TL;DR: This paper proposes an efficient and secure big data storage system in cloud computing, in which a leakage-resilient encryption scheme serves as the main ingredient and indicates that the leakage ratio in the scheme can reach roughly 1/3 and is higher than other schemes.
Journal ArticleDOI

Provably leakage-resilient three-party password-based authenticated key exchange

TL;DR: A continuous after-the-fact LR eCK-security model for 3PAke is defined and a LR 3PAKE protocol is proposed, then a formal security proof in the standard model is presented.
References
More filters
Book ChapterDOI

Identity-based cryptosystems and signature schemes

TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Book ChapterDOI

Differential Power Analysis

TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Proceedings ArticleDOI

On lattices, learning with errors, random linear codes, and cryptography

TL;DR: A public-key cryptosystem whose hardness is based on the worst-case quantum hardness of SVP and SIVP, and an efficient solution to the learning problem implies a quantum, which can be made classical.
Proceedings ArticleDOI

Trapdoors for hard lattices and new cryptographic constructions

TL;DR: In this article, the authors show how to construct a variety of "trapdoor" cryptographic tools assuming the worst-case hardness of standard lattice problems (such as approximating the length of the shortest nonzero vector to within certain polynomial factors).
Journal ArticleDOI

On lattices, learning with errors, random linear codes, and cryptography

TL;DR: A (classical) public-key cryptosystem whose security is based on the hardness of the learning problem, which is a reduction from worst-case lattice problems such as GapSVP and SIVP to a certain learning problem that is quantum.
Related Papers (5)