Bounded leakage-resilient functional encryption with hidden vector predicate

被引:0
|
作者
机构
[1] [1,Zhang, Mingwu
[2] Yang, Bo
[3] Takagi, Tsuyoshi
来源
Zhang, M. (mwzhang@imi.kyushu-u.ac.jp) | 1600年 / Oxford University Press卷 / 56期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate
    Zhang, Mingwu
    Yang, Bo
    Takagi, Tsuyoshi
    [J]. COMPUTER JOURNAL, 2013, 56 (04): : 464 - 477
  • [2] Leakage-Resilient Functional Encryption via Pair Encodings
    Yu, Zuoxia
    Au, Man Ho
    Xu, Qiuliang
    Yang, Rupeng
    Han, Jinguang
    [J]. INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 443 - 460
  • [3] Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
    Kraemer, Juliane
    Struck, Patrick
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 315 - 337
  • [4] Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
    Zhang, Jie
    Chen, Jie
    Gong, Junqing
    Ge, Aijun
    Ma, Chuangui
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (06) : 1339 - 1366
  • [5] Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
    Jie Zhang
    Jie Chen
    Junqing Gong
    Aijun Ge
    Chuangui Ma
    [J]. Designs, Codes and Cryptography, 2018, 86 : 1339 - 1366
  • [6] Memory leakage-resilient searchable symmetric encryption
    Dai, Shuguang
    Li, Huige
    Zhang, Fangguo
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 76 - 84
  • [7] Constructing Committing and Leakage-Resilient Authenticated Encryption
    Struck, Patrick
    Weishaeupl, Maximiliane
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) : 497 - 528
  • [8] Leakage-resilient certificate-based encryption
    Yu, Qihong
    Li, Jiguo
    Zhang, Yichen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3346 - 3355
  • [9] Verifiable memory leakage-resilient dynamic searchable encryption
    Guan, Wenhao
    Wang, Yunling
    Wang, Jianfeng
    Fu, Xiaotong
    [J]. JOURNAL OF HIGH SPEED NETWORKS, 2018, 24 (03) : 201 - 217
  • [10] Leakage-resilient identity-based encryption scheme
    Li, Sujuan
    Zhang, Futai
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 187 - 196