Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2864163
Abstract: Lossy trapdoor functions (LTFs) are very useful tools in constructing complex cryptographic primitives in a black-box manner, such as injective trapdoor functions, collision-resistant hashes, CCA secure public-key encryption, and so on. However, the trapdoor is…
read more here.
Keywords:
leakage resilient;
leakage;
trapdoor functions;
updatable lossy ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2018.2878406
Abstract: Currently, the number of Internet of Things (IoT) devices making up the IoT is more than 11 billion and this number has been continuously increasing. The prevalence of these devices leads to an emerging IoT…
read more here.
Keywords:
leakage;
bitcoin;
data trading;
trading iot ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2017.2685524
Abstract: Authenticated key exchange (AKE) scheme is one of the most widely used cryptographic primitives in practice, even in the Internet-of-Things (IoT) environments. In order to resist side-channel attacks, several works have been proposed for defining…
read more here.
Keywords:
leakage resilient;
ake;
identity based;
authenticated key ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Journal of Mathematical Cryptology"
DOI: 10.1515/jmc-2016-0003
Abstract: Abstract Typically, secure channels are constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties based on long-term public keys and establishes secret session keys. In this paper we address the partial…
read more here.
Keywords:
resilient key;
leakage resilient;
security;
key exchange ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2022 at "Informatica"
DOI: 10.15388/22-infor474
Abstract: To resolve both certificate management and key escrow problems, a certificateless public-key system (CLPKS) has been proposed. However, a CLPKS setting must provide a revocation mechanism to revoke compromised users. Thus, a revocable certificateless public-key…
read more here.
Keywords:
revocation;
leakage resilient;
revocable certificateless;
outsourced revocation ... See more keywords