Page
%P
![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits
At Asiacrypt 2013, Qin and Liu showed a leakage-resilient chosen-ciphertext attacks (LR-CCA) secure public-key encryption (PKE) from one-time lossy filter (OT-LF) and hash proof system (HPS), from which, combi...
-
Chapter and Conference Paper
Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem
An Identity-based encryption (IBE) simplifies key management by taking users’ identities as public keys. However, how to dynamically revoke users in an IBE scheme is not a trivial problem. To solve this proble...