Citation: | ZHOU Yanwei and YANG Bo, “Continuous Leakage-Resilient Identity-Based Encryption Scheme with CCA Security,” Chinese Journal of Electronics, vol. 28, no. 4, pp. 682-689, 2019, doi: 10.1049/cje.2019.04.004 |
S.L. Liu, J. Weng and Y.L. Zhao, “Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks”, P roc: of Topics in Cryptology-CT-RSA 2013, San Francisco, CA, USA, pp.84–100, 2013.
|
J. Alwen, Y. Dodis, M. Naor, et al., “Public-key encryption in the bounded-retrieval model”. Proc. of EUROCRYPT 2010, French Riviera, pp.113–134, 2010.
|
S.S.M. Chow, Y. Dodis, Y. Rouselakis, et al., “Practical leakage-resilient identity-based encryption from simple assumptions”, Proc. of the 17th ACM Conference on Computer and Communications Security, Chicago, Illinois, USA, pp.152–161, 2010.
|
S.J. Li and F.T. Zhang, “Leakage-resilient identity-based encryption scheme”, International Journal of Grid & Utility Computing, Vol.4, No.2/3, pp.187–196, 2013.
|
J.G. Li, M.L. Teng, Y.C. Zhang, et al., “A leakageresilient CCA-secure identity-based encryption scheme”, The Computer Journal, Vol.59, No.7, pp.1066–1075, 2016.
|
S.F. Sun, D.W. Gu and S.L. Liu, “Efficient chosen ciphertext secure identity-based encryption against key leakage attacks”, Security and Communication Networks, Vol.9, No.11, PP.1417–1434, 2016.
|
Y. Chen, S. Luo and Z. Chen, “A New leakage-resilient IBE scheme in the relative leakage model”, Proc. of 25th Annual Conference on Data and Applications Security and Privacy, Richmond, VA, USA, pp.263–270, 2011.
|
J.G. Li, Y.Y. Guo, Q.H. Yu, et al., “Provably secure identitybased encryption resilient to post-challenge continuous auxiliary inputs leakage”, Security and Communication Networks, Vol.9, No.10, pp.1016–1024, 2016.
|
Q.H. Yu, J.G. Li, Y.C. Zhang, et al., “Certificate-based encryption resilient to key leakage”, Journal of Systems and Software, Vol.116, pp.101–112, 2016.
|
J.G. Li, Y.Y. Guo, Q.H. Yu, et al. “Continuous leakageresilient certificate-based encryption”, Information Sciences, Vol.355-356, pp.1–14, 2016.
|
Q.H. Yu, J.G. Li and Y.C. Zhang, “Leakage-resilient certificate-based encryption”, Security and Communication Networks, Vol.8, pp.3346–3355, 2015.
|
C.R. Chen, Y. Mu, G.M. Yang, et al., “Strongly leakageresilient authenticated key exchange”, Proc. of Topics in Cryptology-CT-RSA2016, San Francisco, CA, USA, pp.19–36, 2016.
|
C. Gentry, “Practical identity-based encryption without random oracles”, Proc. of EUROCRYPT 2006, St. Petersburg, Russia, pp.445–464, 2006.
|
R. Cramer and V. Shoup, “Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack”. SIAM Journal on Computing, Vol.33, No.1, pp.167–226, 2003.
|
Y. Dodis and L. Reyzin, “Fuzzy extractors: How to generate strong keys from biometrics and other noisy data”, SIAM Journal on Computing, Vol.38, No.1, pp.97–139, 2008.
|
Y. Dodis, K. Haralambiev and A.L.D. Wichs, “Cryptography against continuous memory attacks”, Proc. of 51th Annual IEEE Symposium on Foundations of Computer Science, Las Vegas, Nevada, USA, pp.511–520, 2010.
|
M. Abe, R. Gennaro, K. Kurosawa, et al., “Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM”, Proc. of EUROCRYPT 2005, Aarhus, Denmark, pp.128–146, 2005.
|
S.A. Fairouz and L.S Feng, “Symmetric key encryption with conjunctive field free keyword search scheme”, British Journal of Mathematics & Computer Science, Vol.16, No.6, pp.1–11, 2016.
|
B. Waters, “Efficient identity-based encryption without random oracles”, Proc. of EUROCRYPT 2005, Aarhus, Denmark, pp.114–127, 2005.
|