Fully Secure ID‐Based Signature Scheme with Continuous Leakage Resilience

Q Yu, J Li, S Ji - Security and Communication Networks, 2022 - Wiley Online Library
The side channel attacks will lead to the destruction of the security of the traditional
cryptographic scheme. Leakage‐resilient identity‐based signature has attracted great …

Leakage‐resilient certificate‐based encryption

Q Yu, J Li, Y Zhang - Security and Communication Networks, 2015 - Wiley Online Library
Certificate‐based encryption is a new cryptography primitive, which can be used to construct
efficient public key infrastructure. However, side‐channel attacks are not considered in …

Identity-based and leakage-resilient broadcast encryption scheme for cloud storage service

Q Yu, J Li, S Ji - Applied Sciences, 2022 - mdpi.com
Cloud storage services are an important application of cloud computing. An increasing
number of data owners store their data on cloud platforms. Since cloud platforms are far …

Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio

R Nishimaki, T Yamakawa - IACR International Workshop on Public Key …, 2019 - Springer
We propose new constructions of leakage-resilient public-key encryption (PKE) and identity-
based encryption (IBE) schemes in the bounded retrieval model (BRM). In the BRM …

Anonymous Identity Based Broadcast Encryption against Continual Side Channel Attacks in the State Partition Model

Q Yu, J Li, S Ji - Applied Sciences, 2022 - mdpi.com
In the past 10 years, many side-channel attacks have been discovered and exploited one
after another by attackers, which have greatly damaged the security of cryptographic …

Secure outsourced medical data against unexpected leakage with flexible access control in a cloud storage system

X Zhou, J Liu, Z Zhang, Q Wu - Security and Communication …, 2020 - Wiley Online Library
The application of cloud storage system has been deployed widely in recent years. A lot of
electronic medical records (EMRs) are collected and uploaded to the cloud for scalable …

[HTML][HTML] Post-challenge leakage in public-key encryption

Z Zhang, SSM Chow, Z Cao - Theoretical Computer Science, 2015 - Elsevier
When an adversary can measure the physical memory storing the decryption key, decryption
functionality often comes in handy. Halevi and Lin (TCC'11) studied after-the-fact (or post …

抗泄漏CCA 安全的内积功能加密

韩帅, 刘胜利, 谷大武 - Journal of Cryptologic Research, 2023 - search.proquest.com
内积功能加密(IPFE) 是一类重要的功能加密方案, 其使用功能密钥对密文进行解密时可以恢复出
明文消息的内积值, 在生物特征认证, 近邻搜索和统计分析等场景有很多应用 …

[HTML][HTML] Identity-based encryption with leakage-amplified chosen-ciphertext attacks security

Y Zhou, B Yang, Z Xia, M Zhang, Y Mu - Theoretical Computer Science, 2020 - Elsevier
Abstract Alwen et al.(EUROCRYPT 2010) proposed the formal definition of identity-based
hash proof system (IB-HPS). As an independent interest, they showed that a leakage …

[HTML][HTML] Novel updatable identity-based hash proof system and its applications

Y Zhou, B Yang, T Wang, Y Mu - Theoretical Computer Science, 2020 - Elsevier
Alwen et al. in Eurocrypt 2010, showed that an identity-based hash proof system (IB-HPS),
where IB-HPS generalizes the notion of hash proof system (HPS) to the identity-based …