메뉴 건너뛰기




Volumn 8712 LNCS, Issue PART 1, 2014, Pages 130-147

Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks

Author keywords

auxiliary inputs; IBE; leakage resilient; randomness

Indexed keywords

PUBLIC KEY CRYPTOGRAPHY; RANDOM PROCESSES; SECURITY SYSTEMS; WIRELESS SENSOR NETWORKS;

EID: 84906492508     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-11203-9_8     Document Type: Conference Paper
Times cited : (34)

References (21)
  • 2
    • 84906500244 scopus 로고    scopus 로고
    • Cloud Security Alliance: Expanded top ten big data security and privacy challenges (2013)
    • Cloud Security Alliance: Expanded top ten big data security and privacy challenges (2013)
  • 4
    • 84910678443 scopus 로고    scopus 로고
    • I forgot your password: Randomness attacks against php applications
    • USENIX Association (2012)
    • Argyros, G., Kiayias, A.: I forgot your password: randomness attacks against php applications. In: USENIX Security 2012, p. 6 USENIX Association (2012)
    • (2012) USENIX Security , pp. 6
    • Argyros, G.1    Kiayias, A.2
  • 6
    • 84874300817 scopus 로고    scopus 로고
    • Randomly failed! the state of randomness in current java implementations
    • In: Dawson, E. (ed.). Springer, Heidelberg
    • Michaelis, K., Meyer, C., Schwenk, J.: Randomly failed! the state of randomness in current java implementations. In: Dawson, E. (ed.) CT-RSA 2013. LNCS, vol. 7779, pp. 129-144. Springer, Heidelberg (2013)
    • (2013) CT-RSA 2013. LNCS , vol.7779 , pp. 129-144
    • Michaelis, K.1    Meyer, C.2    Schwenk, J.3
  • 9
    • 70350627587 scopus 로고    scopus 로고
    • Simultaneous hardcore bits and cryptography against memory attacks
    • In: Reingold, O. (ed.). Springer, Heidelberg
    • Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 474-495. Springer, Heidelberg (2009)
    • (2009) TCC 2009. LNCS , vol.5444 , pp. 474-495
    • Akavia, A.1    Goldwasser, S.2    Vaikuntanathan, V.3
  • 10
    • 70350303869 scopus 로고    scopus 로고
    • Public-key cryptosystems resilient to key leakage
    • In: Halevi, S. (ed.). Springer, Heidelberg
    • Naor, M., Segev, G.: Public-key cryptosystems resilient to key leakage. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 18-35. Springer, Heidelberg (2009)
    • (2009) CRYPTO 2009. LNCS , vol.5677 , pp. 18-35
    • Naor, M.1    Segev, G.2
  • 11
    • 70350674336 scopus 로고    scopus 로고
    • On cryptography with auxiliary input
    • In: Mitzenmacher, M. (ed.). ACM
    • Dodis, Y., Kalai, Y.T., Lovett, S.: On cryptography with auxiliary input. In: Mitzenmacher, M. (ed.) STOC 2009, pp. 621-630. ACM (2009)
    • (2009) STOC 2009 , pp. 621-630
    • Dodis, Y.1    Kalai, Y.T.2    Lovett, S.3
  • 12
    • 84864815981 scopus 로고    scopus 로고
    • Fully leakage-resilient signatures with auxiliary inputs
    • In: Susilo, W., Mu, Y., Seberry, J. (eds.). Springer, Heidelberg
    • Yuen, T.H., Yiu, S.M., Hui, L.C.K.: Fully leakage-resilient signatures with auxiliary inputs. In: Susilo, W., Mu, Y., Seberry, J. (eds.) ACISP 2012. LNCS, vol. 7372, pp. 294-307. Springer, Heidelberg (2012)
    • (2012) ACISP 2012. LNCS , vol.7372 , pp. 294-307
    • Yuen, T.H.1    Yiu, S.M.2    Hui, L.C.K.3
  • 13
    • 72449189555 scopus 로고    scopus 로고
    • Hedged public-key encryption: How to protect against bad randomness
    • In: Matsui, M. (ed.). Springer, Heidelberg
    • Bellare, M., Brakerski, Z., Naor, M., Ristenpart, T., Segev, G., Shacham, H., Yilek, S.: Hedged public-key encryption: How to protect against bad randomness. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 232-249. Springer, Heidelberg (2009)
    • (2009) ASIACRYPT 2009. LNCS , vol.5912 , pp. 232-249
    • Bellare, M.1    Brakerski, Z.2    Naor, M.3    Ristenpart, T.4    Segev, G.5    Shacham, H.6    Yilek, S.7
  • 14
    • 80053151545 scopus 로고    scopus 로고
    • Randomness leakage in the kem/dem framework
    • In: Boyen, X., Chen, X. (eds.). Springer, Heidelberg
    • Namiki, H., Tanaka, K., Yasunaga, K.: Randomness leakage in the kem/dem framework. In: Boyen, X., Chen, X. (eds.) ProvSec 2011. LNCS, vol. 6980, pp. 309-323. Springer, Heidelberg (2011)
    • (2011) ProvSec 2011. LNCS , vol.6980 , pp. 309-323
    • Namiki, H.1    Tanaka, K.2    Yasunaga, K.3
  • 15
    • 77949580684 scopus 로고    scopus 로고
    • Publickey encryption schemes with auxiliary inputs
    • In: Micciancio, D. (ed.). Springer, Heidelberg
    • Dodis, Y., Goldwasser, S., Kalai, Y.T., Peikert, C., Vaikuntanathan, V.: Publickey encryption schemes with auxiliary inputs. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 361-381. Springer, Heidelberg (2010)
    • (2010) TCC 2010. LNCS , vol.5978 , pp. 361-381
    • Dodis, Y.1    Goldwasser, S.2    Kalai, Y.T.3    Peikert, C.4    Vaikuntanathan, V.5
  • 16
    • 84859970436 scopus 로고    scopus 로고
    • Identity-based encryption resilient to continual auxiliary leakage
    • In: Pointcheval, D., Johansson, T. (eds.). Springer, Heidelberg
    • Yuen, T.H., Chow, S.S.M., Zhang, Y., Yiu, S.M.: Identity-based encryption resilient to continual auxiliary leakage. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 117-134. Springer, Heidelberg (2012)
    • (2012) Eurocrypt 2012. LNCS , vol.7237 , pp. 117-134
    • Yuen, T.H.1    Chow, S.S.M.2    Zhang, Y.3    Yiu, S.M.4
  • 17
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • In: Cachin, C., Camenisch, J.L. (eds.). Springer, Heidelberg
    • Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
    • (2004) Eurocrypt 2004. LNCS , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 18
    • 84871587528 scopus 로고    scopus 로고
    • Signature schemes secure against hard-to-invert leakage
    • In: Wang, X., Sako, K. (eds.). Springer, Heidelberg
    • Faust, S., Hazay, C., Nielsen, J.B., Nordholt, P.S., Zottarel, A.: Signature schemes secure against hard-to-invert leakage. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 98-115. Springer, Heidelberg (2012)
    • (2012) ASIACRYPT 2012. LNCS , vol.7658 , pp. 98-115
    • Faust, S.1    Hazay, C.2    Nielsen, J.B.3    Nordholt, P.S.4    Zottarel, A.5
  • 19
    • 79953188688 scopus 로고    scopus 로고
    • After-The-fact leakage in public-key encryption
    • In: Ishai, Y. (ed.). Springer, Heidelberg
    • Halevi, S., Lin, H.: After-the-fact leakage in public-key encryption. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 107-124. Springer, Heidelberg (2011)
    • (2011) TCC 2011. LNCS , vol.6597 , pp. 107-124
    • Halevi, S.1    Lin, H.2
  • 20
    • 84858329133 scopus 로고    scopus 로고
    • Leakage-tolerant interactive protocols
    • In: Cramer, R. (ed.). Springer, Heidelberg
    • Bitansky, N., Canetti, R., Halevi, S.: Leakage-tolerant interactive protocols. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 266-284. Springer, Heidelberg (2012)
    • (2012) TCC 2012. LNCS , vol.7194 , pp. 266-284
    • Bitansky, N.1    Canetti, R.2    Halevi, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.