A survey of leakage-resilient cryptography
In the past 15 years, cryptography has made considerable progress in expanding the
adversarial attack model to cover side-channel attacks and has built schemes to provably …
adversarial attack model to cover side-channel attacks and has built schemes to provably …
Storing secrets on continually leaky devices
We consider the question of how to store a value secretly on devices that continually leak
information about their internal state to an external attacker. If the secret value is stored on a …
information about their internal state to an external attacker. If the secret value is stored on a …
Provably secure identity‐based encryption resilient to post‐challenge continuous auxiliary input leakage
J Li, Y Guo, Q Yu, Y Lu, Y Zhang - Security and Communication …, 2016 - Wiley Online Library
The situation for post‐challenge continuous auxiliary input leakage has not been considered
in the cryptography schemes for previous literature. We present a semantic‐security model …
in the cryptography schemes for previous literature. We present a semantic‐security model …
A direct construction of continuous leakage-resilient (H) IBE scheme with CCA security from dual system encryption
Y Zhou, L Cao, B Yang, Z Xia, C Gu, M Zhang - Computer Standards & …, 2023 - Elsevier
Continuous leakage resilient semantically secure Identity-based Encryption (IBE) schemes
created with dual system encryption technique were presented by Lewko et al. at TCC 2011 …
created with dual system encryption technique were presented by Lewko et al. at TCC 2011 …
Continuous leakage-resilient certificate-based encryption
J Li, Y Guo, Q Yu, Y Lu, Y Zhang, F Zhang - Information Sciences, 2016 - Elsevier
Encryption schemes are generally considered to be secure in an ideal environment, where
the adversary cannot obtain the secret internal state of schemes. However, in the realistic …
the adversary cannot obtain the secret internal state of schemes. However, in the realistic …
[HTML][HTML] Provably secure certificate-based encryption with leakage resilience
Y Guo, J Li, Y Lu, Y Zhang, F Zhang - Theoretical Computer Science, 2018 - Elsevier
The security of encryption schemes, in general, has been considered in an ideal
environment, where the adversary cannot obtain the secret internal state of the scheme …
environment, where the adversary cannot obtain the secret internal state of the scheme …
Continuous leakage-resilient identity-based encryption without random oracles
Y Zhou, B Yang, Y Mu - The Computer Journal, 2018 - academic.oup.com
Provably secure identity-based encryption (IBE) schemes in the presence of key-leakage
have attracted a lot of attention recently. However, most of them were designed in the …
have attracted a lot of attention recently. However, most of them were designed in the …
Continuous leakage-resilient public-key encryption scheme with CCA security
Y Zhou, B Yang - The Computer Journal, 2017 - academic.oup.com
In recent years, much attention has been focused on designing provably secure public-key
encryption (PKE) scheme in the presence of key-leakage. However, most of them are …
encryption (PKE) scheme in the presence of key-leakage. However, most of them are …
Leakage-resilient coin tossing
The ability to collectively toss a common coin among nn parties in the presence of faults is
an important primitive in the arsenal of randomized distributed protocols. In the case of …
an important primitive in the arsenal of randomized distributed protocols. In the case of …
Novel public-key encryption with continuous leakage amplification
Z Qiao, Q Yang, Y Zhou, Z Xia… - The Computer Journal, 2021 - academic.oup.com
Leakage of private information, such as the secret keys, has become a threat to the security
of computing systems. It has become a common requirement that cryptographic schemes …
of computing systems. It has become a common requirement that cryptographic schemes …