74
Views
4
CrossRef citations to date
0
Altmetric
Information Engineering

Efficient chosen-ciphertext secure hybrid encryption scheme tolerating continuous leakage attacks

, , &
Pages 39-47 | Received 06 Jun 2017, Accepted 08 Nov 2018, Published online: 29 Jan 2019

References

  • Chen, R. M., Y. Mu, G. M. Yang, W. Susilo, and F. C. Guo. 2016. “Strongly Leakage-Resilient Authenticated Key Exchange.” In Proceeding of the Cryptographers’ Track at the RSA Conference, San Francisco, CA, USA, 29 February–March 4, 19–36. Berlin: Springer.
  • Chow, S., Y. Dodis, Y. Rouselakis, and B. Waters. 2010. “Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions.” In Proceeding of 17th ACM conference on Computer and Communications SecurityChicago, Illinois, 4–8 October, 152–161. New York: ACM.
  • Dodis, Y., K. Haralambiev, L. A. Adriana, and D. Wichs. 2010. “Cryptography Against Continuous Memory Attacks.” In Proceeding of 51th Annual IEEE Symposium on Foundations of Computer Science, Las Vegas, Nevada, 23–26 October, 511–520. Berlin: Springer. doi:10.1177/1753193409361293.
  • Dodis, Y., and L. Reyzin. 2004. “Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data.” In Proceeding of International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2–6 May, 523–540. Berlin: Springer. doi:10.1111/j.1600-0722.2004.00165.x.
  • Li, J. G., M. Teng, Y. C. Zhang, and Q. Yu. 2016. “A Leakage-Resilient CCA-secure Identity-Based Encryption Scheme.” The Computer Journal 59 (7): 1066–1075. doi:10.1093/comjnl/bxv128.
  • Li, S. J., F. T. Zhang, Y. X. Sun, and L. M. Shen. 2013. “Efficient Leakage-Resilient Public Key Encryption from DDH Assumption.” Cluster Computing 16 (4): 797–806. doi:10.1007/s10586-013-0253-z.
  • Liu, S. L., J. Weng, and Y. L. Zhao. 2013. “Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks.” In Proceeding of The Cryptographers’ Track at the RSA Conference, San Francisco, CA, 25 February–1 March, 84–100. Berlin: Springer.
  • Naor, M., and G. Segev. 2012. “Public-Key Cryptosystems Resilient to Key Leakage.” SIAM Journal on Computing 41 (4): 772–814. doi:10.1137/100813464.
  • Qin, B. D., S. L. Liu, and K. F. Chen. 2014. “Efficient Chosen-Ciphertext Secure Public-Key Encryption Scheme with High Leakage-Resilience.” IET Information Security 9 (1): 32–42. doi:10.1049/iet-ifs.2013.0173.
  • Yu, Q. H., J. G. Li, Y. Zhang, W. Wu, X. Y. Huang, and Y. Xiang. 2016. “Certificate-Based Encryption Resilient to Key Leakage.” Journal of Systems and Software 116: 101–112. doi:10.1016/j.jss.2015.05.066.
  • Zhou, Y. W., and B. Yang. 2017. “Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security.” The Computer Journal 60 (8): 1161–1172. doi:10.1093/comjnl/bxw110.
  • Zhou, Y. W., B. Yang, and W. Z. Zhang. 2016. “Provably Secure and Efficient Leakage-Resilient Certificateless Signcryption Scheme without Bilinear Pairing.” Discrete Applied Mathematics 204: 185–202. doi:10.1016/j.dam.2015.10.018.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.