Academic literature on the topic 'Certificateless key encapsulation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Certificateless key encapsulation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Certificateless key encapsulation"

1

Wu, Jui-Di, Yuh-Min Tseng, Sen-Shan Huang, and Wei-Chieh Chou. "Leakage-Resilient Certificateless Key Encapsulation Scheme." Informatica 29, no. 1 (2018): 125–55. http://dx.doi.org/10.15388/informatica.2018.161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Long, Yu, and Kefei Chen. "Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism." Information Sciences 180, no. 7 (2010): 1167–81. http://dx.doi.org/10.1016/j.ins.2009.12.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Long, Yu, Xiang-xue Li, Ke-fei Chen, and Xuan Hong. "Distributed certificateless key encapsulation mechanism secure against the adaptive adversary." Journal of Shanghai Jiaotong University (Science) 14, no. 1 (2009): 102–6. http://dx.doi.org/10.1007/s12204-009-0102-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yang, Junhan, and Tianjie Cao. "Provably Secure Three-Party Authenticated Key Exchange Based on Certificateless Key Encapsulation Sensor Mechanism." Sensor Letters 11, no. 11 (2013): 2141–44. http://dx.doi.org/10.1166/sl.2013.2960.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Certificateless key encapsulation"

1

Lippold, Georg. "Encryption schemes and key exchange protocols in the certificateless setting." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/41697/1/Georg_Lippold_Thesis.pdf.

Full text
Abstract:
The contributions of this thesis fall into three areas of certificateless cryptography. The first area is encryption, where we propose new constructions for both identity-based and certificateless cryptography. We construct an n-out-of- n group encryption scheme for identity-based cryptography that does not require any special means to generate the keys of the trusted authorities that are participating. We also introduce a new security definition for chosen ciphertext secure multi-key encryption. We prove that our construction is secure as long as at least one authority is uncompromised, and show that the existing constructions for chosen ciphertext security from identity-based encryption also hold in the group encryption case. We then consider certificateless encryption as the special case of 2-out-of-2 group encryption and give constructions for highly efficient certificateless schemes in the standard model. Among these is the first construction of a lattice-based certificateless encryption scheme. Our next contribution is a highly efficient certificateless key encapsulation mechanism (KEM), that we prove secure in the standard model. We introduce a new way of proving the security of certificateless schemes based that are based on identity-based schemes. We leave the identity-based part of the proof intact, and just extend it to cover the part that is introduced by the certificateless scheme. We show that our construction is more efficient than any instanciation of generic constructions for certificateless key encapsulation in the standard model. The third area where the thesis contributes to the advancement of certificateless cryptography is key agreement. Swanson showed that many certificateless key agreement schemes are insecure if considered in a reasonable security model. We propose the first provably secure certificateless key agreement schemes in the strongest model for certificateless key agreement. We extend Swanson's definition for certificateless key agreement and give more power to the adversary. Our new schemes are secure as long as each party has at least one uncompromised secret. Our first construction is in the random oracle model and gives the adversary slightly more capabilities than our second construction in the standard model. Interestingly, our standard model construction is as efficient as the random oracle model construction.
APA, Harvard, Vancouver, ISO, and other styles
2

Chou, Wei-Chieh, and 周緯傑. "Leakage-Resilient Certificateless Key Encapsulation Scheme." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/uhjbfd.

Full text
Abstract:
碩士<br>國立彰化師範大學<br>數學系<br>105<br>The previous adversary models of public key cryptography usually have a nature assumption that permanent/temporary secret (private) keys must be kept safely and other internal states are not leaked to an adversary. However, in practice, it is difficult to keep away from all possible kinds of leakage on these secret data due to a new kind of threat, called “side-channel attacks”. By side-channel attacks, the adversary could obtain some partial information of these secret data so that some existing adversary models could be insufficient. Indeed, the study of leakage-resilient cryptography resistant to side-channel attacks has received significant attention recently. Up to date, no work has been done on the design of leakage-resilient certificateless key encapsulation encryption (LR-CL-KE) schemes under the continual leakage model. In this article, we propose the first LR-CL-KE scheme under the continual leakage model. In the generic bilinear group (GBG) model, we formally prove that our LR-CL-KE scheme is semantically secure against adaptive chosen ciphertext attacks for both Type I and Type II adversaries.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Certificateless key encapsulation"

1

Addobea, Abigail Akosua, QianMu Li, Isaac Amankona Obiri, and Jun Hou. "A Gas Cost Analytical Approach Based on Certificateless Key Encapsulation Protocol for Medicalized Blockchains." In Communications in Computer and Information Science. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-8445-7_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography