Articles with "leakage resilient" as a keyword



Photo by dropthelabelmovement from unsplash

Consecutive Leakage-Resilient and Updatable Lossy Trapdoor Functions and Application in Sensitive Big-Data Environments

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2864163

Abstract: Lossy trapdoor functions (LTFs) are very useful tools in constructing complex cryptographic primitives in a black-box manner, such as injective trapdoor functions, collision-resistant hashes, CCA secure public-key encryption, and so on. However, the trapdoor is… read more here.

Keywords: leakage resilient; leakage; trapdoor functions; updatable lossy ... See more keywords
Photo by homajob from unsplash

LRCoin: Leakage-Resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2018.2878406

Abstract: Currently, the number of Internet of Things (IoT) devices making up the IoT is more than 11 billion and this number has been continuously increasing. The prevalence of these devices leads to an emerging IoT… read more here.

Keywords: leakage; bitcoin; data trading; trading iot ... See more keywords
Photo by dropthelabelmovement from unsplash

After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2017.2685524

Abstract: Authenticated key exchange (AKE) scheme is one of the most widely used cryptographic primitives in practice, even in the Internet-of-Things (IoT) environments. In order to resist side-channel attacks, several works have been proposed for defining… read more here.

Keywords: leakage resilient; ake; identity based; authenticated key ... See more keywords
Photo from wikipedia

On the leakage-resilient key exchange

Sign Up to like & get
recommendations!
Published in 2017 at "Journal of Mathematical Cryptology"

DOI: 10.1515/jmc-2016-0003

Abstract: Abstract Typically, secure channels are constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties based on long-term public keys and establishes secret session keys. In this paper we address the partial… read more here.

Keywords: resilient key; leakage resilient; security; key exchange ... See more keywords
Photo by dropthelabelmovement from unsplash

Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority

Sign Up to like & get
recommendations!
Published in 2022 at "Informatica"

DOI: 10.15388/22-infor474

Abstract: To resolve both certificate management and key escrow problems, a certificateless public-key system (CLPKS) has been proposed. However, a CLPKS setting must provide a revocation mechanism to revoke compromised users. Thus, a revocable certificateless public-key… read more here.

Keywords: revocation; leakage resilient; revocable certificateless; outsourced revocation ... See more keywords