메뉴 건너뛰기




Volumn 7237 LNCS, Issue , 2012, Pages 117-134

Identity-based encryption resilient to continual auxiliary leakage

Author keywords

[No Author keywords available]

Indexed keywords

AUXILIARY INPUTS; IDENTITY BASED ENCRYPTION; IDENTITY-BASED; PRIVATE KEY; PUBLIC-KEY ENCRYPTION; SECRET KEY; THE STANDARD MODEL; TIME-PERIODS;

EID: 84859970436     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-29011-4_9     Document Type: Conference Paper
Times cited : (106)

References (17)
  • 1
    • 70350627587 scopus 로고    scopus 로고
    • Simultaneous hardcore bits and cryptography against memory attacks
    • Reingold, O. (ed.) TCC 2009 Springer, Heidelberg
    • Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous Hardcore Bits and Cryptography against Memory Attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 474-495. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 474-495
    • Akavia, A.1    Goldwasser, S.2    Vaikuntanathan, V.3
  • 2
    • 77954650592 scopus 로고    scopus 로고
    • Public-key encryption in the bounded-retrievalmodel
    • Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
    • Alwen, J., Dodis, Y., Naor, M., Segev, G., Walfish, S., Wichs, D.: Public-Key Encryption in the Bounded-RetrievalModel. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 113-134. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 113-134
    • Alwen, J.1    Dodis, Y.2    Naor, M.3    Segev, G.4    Walfish, S.5    Wichs, D.6
  • 3
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Cramer, R. (ed.) EUROCRYPT 2005 Springer, Heidelberg
    • Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical Identity Based Encryption with Constant Size Ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 4
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-DNF Formulas on Ciphertexts
    • Kilian, J. (ed.) TCC 2005 Springer, Heidelberg
    • Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF Formulas on Ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-341. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3378 , pp. 325-341
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3
  • 5
    • 24144453101 scopus 로고    scopus 로고
    • Improved efficiency for CCA-secure cryptosystems built using identity-based encryption
    • Menezes, A. (ed.) CT-RSA 2005 Springer, Heidelberg
    • Boneh, D., Katz, J.: Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 87-103. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3376 , pp. 87-103
    • Boneh, D.1    Katz, J.2
  • 7
    • 67049154036 scopus 로고    scopus 로고
    • Removing escrow from identity-based encryption
    • Jarecki, S., Tsudik, G. (eds.) PKC 2009 Springer, Heidelberg
    • Chow, S.S.M.: Removing Escrow from Identity-Based Encryption. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 256-276. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5443 , pp. 256-276
    • Chow, S.S.M.1
  • 8
    • 78649985218 scopus 로고    scopus 로고
    • Practical leakage-resilient identity-based encryption from simple assumptions
    • Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM
    • Chow, S.S.M., Dodis, Y., Rouselakis, Y., Waters, B.: Practical leakage-resilient identity-based encryption from simple assumptions. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) CCS 2010, pp. 152-161. ACM (2010)
    • (2010) CCS , vol.2010 , pp. 152-161
    • Chow, S.S.M.1    Dodis, Y.2    Rouselakis, Y.3    Waters, B.4
  • 9
    • 77949580684 scopus 로고    scopus 로고
    • Public-key encryption schemes with auxiliary inputs
    • Micciancio, D. (ed.) TCC 2010 Springer, Heidelberg
    • Dodis, Y., Goldwasser, S., Kalai, Y.T., Peikert, C., Vaikuntanathan, V.: Public-Key Encryption Schemes with Auxiliary Inputs. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 361-381. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5978 , pp. 361-381
    • Dodis, Y.1    Goldwasser, S.2    Kalai, Y.T.3    Peikert, C.4    Vaikuntanathan, V.5
  • 10
    • 78751485079 scopus 로고    scopus 로고
    • Cryptography against continuous memory attacks
    • IEEE Computer Society
    • Dodis, Y., Haralambiev, K., Ĺopez-Alt, A., Wichs, D.: Cryptography against continuous memory attacks. In: FOCS 2010, pp. 511-520. IEEE Computer Society (2010)
    • (2010) FOCS , pp. 511-520
    • Dodis, Y.1    Haralambiev, K.2    Ĺopez-Alt, A.3    Wichs, D.4
  • 11
    • 51849137205 scopus 로고    scopus 로고
    • Trapdoors for hard lattices and new cryptographic constructions
    • Dwork, C. (ed.) ACM
    • Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Dwork, C. (ed.) STOC 2008, pp. 197-206. ACM (2008)
    • (2008) STOC , pp. 197-206
    • Gentry, C.1    Peikert, C.2    Vaikuntanathan, V.3
  • 12
    • 79959686827 scopus 로고    scopus 로고
    • How to leak on key updates
    • Fortnow, L., Vadhan, S.P. (eds.) ACM
    • Lewko, A.B., Lewko, M., Waters, B.: How to leak on key updates. In: Fortnow, L., Vadhan, S.P. (eds.) STOC 2011, pp. 725-734. ACM (2011)
    • (2011) STOC , vol.2011 , pp. 725-734
    • Lewko, A.B.1    Lewko, M.2    Waters, B.3
  • 13
    • 79953164949 scopus 로고    scopus 로고
    • Achieving leakage resilience through dual system encryption
    • Ishai, Y. (ed.) TCC 2011 Springer, Heidelberg
    • Lewko, A.B., Rouselakis, Y., Waters, B.: Achieving Leakage Resilience through Dual System Encryption. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 70-88. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6597 , pp. 70-88
    • Lewko, A.B.1    Rouselakis, Y.2    Waters, B.3
  • 14
    • 77949581448 scopus 로고    scopus 로고
    • New techniques for dual system encryption and fully secure hibe with short ciphertexts
    • Micciancio, D. (ed.) TCC 2010 Springer, Heidelberg
    • Lewko, A., Waters, B.: New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 455-479. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5978 , pp. 455-479
    • Lewko, A.1    Waters, B.2
  • 15
    • 70350303869 scopus 로고    scopus 로고
    • Public-key cryptosystems resilient to key leakagea
    • Halevi, S. (ed.) CRYPTO 2009 Springer, Heidelberg
    • Naor, M., Segev, G.: Public-Key Cryptosystems Resilient to Key Leakage. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 18-35. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 18-35
    • Naor, M.1    Segev, G.2
  • 16
    • 33745571012 scopus 로고    scopus 로고
    • On lattices, learning with errors random linear codes, and cryptography
    • Gabow, H.N., Fagin, R. (eds.) ACM
    • Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: Gabow, H.N., Fagin, R. (eds.) STOC 2005, pp. 84-93. ACM (2005)
    • (2005) STOC , vol.2005 , pp. 84-93
    • Regev, O.1
  • 17
    • 70350345210 scopus 로고    scopus 로고
    • Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions
    • Halevi, S. (ed.) CRYPTO 2009 Springer, Heidelberg
    • Waters, B.: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619-636. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 619-636
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.