Fully Secure ID‐Based Signature Scheme with Continuous Leakage Resilience
Q Yu, J Li, S Ji - Security and Communication Networks, 2022 - Wiley Online Library
The side channel attacks will lead to the destruction of the security of the traditional
cryptographic scheme. Leakage‐resilient identity‐based signature has attracted great …
cryptographic scheme. Leakage‐resilient identity‐based signature has attracted great …
Leakage‐resilient certificate‐based encryption
Q Yu, J Li, Y Zhang - Security and Communication Networks, 2015 - Wiley Online Library
Certificate‐based encryption is a new cryptography primitive, which can be used to construct
efficient public key infrastructure. However, side‐channel attacks are not considered in …
efficient public key infrastructure. However, side‐channel attacks are not considered in …
Identity-based and leakage-resilient broadcast encryption scheme for cloud storage service
Q Yu, J Li, S Ji - Applied Sciences, 2022 - mdpi.com
Cloud storage services are an important application of cloud computing. An increasing
number of data owners store their data on cloud platforms. Since cloud platforms are far …
number of data owners store their data on cloud platforms. Since cloud platforms are far …
Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio
R Nishimaki, T Yamakawa - IACR International Workshop on Public Key …, 2019 - Springer
We propose new constructions of leakage-resilient public-key encryption (PKE) and identity-
based encryption (IBE) schemes in the bounded retrieval model (BRM). In the BRM …
based encryption (IBE) schemes in the bounded retrieval model (BRM). In the BRM …
Anonymous Identity Based Broadcast Encryption against Continual Side Channel Attacks in the State Partition Model
Q Yu, J Li, S Ji - Applied Sciences, 2022 - mdpi.com
In the past 10 years, many side-channel attacks have been discovered and exploited one
after another by attackers, which have greatly damaged the security of cryptographic …
after another by attackers, which have greatly damaged the security of cryptographic …
Secure outsourced medical data against unexpected leakage with flexible access control in a cloud storage system
X Zhou, J Liu, Z Zhang, Q Wu - Security and Communication …, 2020 - Wiley Online Library
The application of cloud storage system has been deployed widely in recent years. A lot of
electronic medical records (EMRs) are collected and uploaded to the cloud for scalable …
electronic medical records (EMRs) are collected and uploaded to the cloud for scalable …
[HTML][HTML] Post-challenge leakage in public-key encryption
When an adversary can measure the physical memory storing the decryption key, decryption
functionality often comes in handy. Halevi and Lin (TCC'11) studied after-the-fact (or post …
functionality often comes in handy. Halevi and Lin (TCC'11) studied after-the-fact (or post …
抗泄漏CCA 安全的内积功能加密
韩帅, 刘胜利, 谷大武 - Journal of Cryptologic Research, 2023 - search.proquest.com
内积功能加密(IPFE) 是一类重要的功能加密方案, 其使用功能密钥对密文进行解密时可以恢复出
明文消息的内积值, 在生物特征认证, 近邻搜索和统计分析等场景有很多应用 …
明文消息的内积值, 在生物特征认证, 近邻搜索和统计分析等场景有很多应用 …
[HTML][HTML] Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
Abstract Alwen et al.(EUROCRYPT 2010) proposed the formal definition of identity-based
hash proof system (IB-HPS). As an independent interest, they showed that a leakage …
hash proof system (IB-HPS). As an independent interest, they showed that a leakage …
[HTML][HTML] Novel updatable identity-based hash proof system and its applications
Alwen et al. in Eurocrypt 2010, showed that an identity-based hash proof system (IB-HPS),
where IB-HPS generalizes the notion of hash proof system (HPS) to the identity-based …
where IB-HPS generalizes the notion of hash proof system (HPS) to the identity-based …