Amanote Research
Register
Sign In
Provably Secure Identity-Based Encryption Resilient to Post-Challenge Continuous Auxiliary Input Leakage
Security and Communication Networks
- Egypt
doi 10.1002/sec.1396
Full Text
Open PDF
Abstract
Available in
full text
Categories
Computer Networks
Information Systems
Communications
Date
December 18, 2015
Authors
Jiguo Li
Yuyan Guo
Qihong Yu
Yang Lu
Yichen Zhang
Publisher
Wiley
Related search
Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split State Model
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Electronic Engineering
Computer Graphics
Signal Processing
Applied Mathematics
Electrical
Computer-Aided Design
Provably Secure Identity-Based Identification and Signature Schemes From Code Assumptions
PLoS ONE
Multidisciplinary
Leakage-Resilient Revocable Identity-Based Signature With Cloud Revocation Authority
Informatica
Applied Mathematics
Information Systems
Identity-Based Encryption
a Provably Secure Code-Based Concurrent Signature Scheme
IET Information Security
Computer Networks
Software
Information Systems
Communications
PSDAAP: Provably Secure Data Authenticated Aggregation Protocols Using Identity-Based Multi-Signature in Marine WSNs
Sensors
Instrumentation
Information Systems
Electronic Engineering
Biochemistry
Analytical Chemistry
Molecular Physics,
Electrical
Atomic
Medicine
Optics
Provably Secure Cryptographic Constructions
A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for Mobile Networks
Leakage-Resilient Cryptography