2015
DOI: 10.1002/sec.1396
|View full text |Cite
|
Sign up to set email alerts
|

Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage

Abstract: The situation for post‐challenge continuous auxiliary input leakage has not been considered in the cryptography schemes for previous literature. We present a semantic‐security model with post‐challenge continuous auxiliary inputs for identity‐based encryption. In this model, the adversary is permitted to obtain some information of the private keys constantly and to query more information after seeing the challenge ciphertext through the side‐channel attacks. Furthermore, we present an identity‐based encryption… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
20
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 46 publications
(20 citation statements)
references
References 34 publications
0
20
0
Order By: Relevance
“…Starting with the work of Boneh et al [13][14][15], searchable encryption has also been considered in the public key setting [10,[16][17][18][19]. The early works lack function privacy until the first definition was suggested very recently by Boneh et al [20].…”
Section: Related Workmentioning
confidence: 99%
“…Starting with the work of Boneh et al [13][14][15], searchable encryption has also been considered in the public key setting [10,[16][17][18][19]. The early works lack function privacy until the first definition was suggested very recently by Boneh et al [20].…”
Section: Related Workmentioning
confidence: 99%
“…However, the first identity-based encryption (IBE) construction was put forward in the literature [23] until 2001. Subsequently, many IBE schemes were proposed [24,25]. By leveraging the idea of IBE, Delerablée [26] raised identity-based broadcast encryption (IBBE), which can be deemed as a special type of PKBE.…”
Section: Introductionmentioning
confidence: 99%
“…Later, Zhang et al also gave two ABE systems (CP‐ABE and KP‐ABE) in the continual leakage model. Li et al gave a construction of LR‐IBE with continuous auxiliary inputs by using dual system techniques, which is CCA secure in the standard model.…”
Section: Introductionmentioning
confidence: 99%