The British Computer Society 2018. All rights reserved. Provably secure identity-based encryption (IBE) schemes in the presence of key-leakage have attracted a lot of attention recently. However, most of them were designed in the bounded-leakage model, and might not be able to meet the claimed security under the continuous-leakage attacks. The main issue is that the most of previous leakage-resilient IBE schemes could not ensure the randomness of all elements in the ciphertext, because some elements can be written as a function on the private key of user; therefore, the adversary can obtain the leakage on the private key of user from the corresponding given ciphertext. In this paper, a new construction of CCA-secure IBE scheme tolerating co...
We propose simple and efficient CCA-secure public-key encryption schemes (i.e., schemes secure again...
Identity-based encryption (IBE) allows one party to send ciphered messages to another using an arbit...
We propose a simple and e#cient construction of a CCAsecure public-key encryption scheme from any C...
We propose the first leakage-resilient Identity-Based Encryption (IBE) scheme with full domain hash ...
Part 9: Short PapersInternational audienceWe propose the first leakage-resilient Identity-Based Encr...
The security for many certificate-based encryption schemes was considered under the ideal condition,...
© International Association for Cryptologic Research 2018. In anonymous identity-based encryption (I...
SUMMARY We present and analyze an adaptive chosen ciphertext secure (IND-CCA) identity-based encrypt...
We propose a generic construction that yields efficient identity-based encryption (IBE) schemes secu...
Abstract. Security against selective opening attack (SOA) requires that in a multi-user setting, eve...
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involvi...
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involvi...
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity sec...
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involvi...
We describe a practical identity-based encryption scheme that is secure in the standard model agains...
We propose simple and efficient CCA-secure public-key encryption schemes (i.e., schemes secure again...
Identity-based encryption (IBE) allows one party to send ciphered messages to another using an arbit...
We propose a simple and e#cient construction of a CCAsecure public-key encryption scheme from any C...
We propose the first leakage-resilient Identity-Based Encryption (IBE) scheme with full domain hash ...
Part 9: Short PapersInternational audienceWe propose the first leakage-resilient Identity-Based Encr...
The security for many certificate-based encryption schemes was considered under the ideal condition,...
© International Association for Cryptologic Research 2018. In anonymous identity-based encryption (I...
SUMMARY We present and analyze an adaptive chosen ciphertext secure (IND-CCA) identity-based encrypt...
We propose a generic construction that yields efficient identity-based encryption (IBE) schemes secu...
Abstract. Security against selective opening attack (SOA) requires that in a multi-user setting, eve...
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involvi...
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involvi...
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity sec...
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involvi...
We describe a practical identity-based encryption scheme that is secure in the standard model agains...
We propose simple and efficient CCA-secure public-key encryption schemes (i.e., schemes secure again...
Identity-based encryption (IBE) allows one party to send ciphered messages to another using an arbit...
We propose a simple and e#cient construction of a CCAsecure public-key encryption scheme from any C...