{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:46:10Z","timestamp":1761324370373,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T00:00:00Z","timestamp":1621382400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T00:00:00Z","timestamp":1621382400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s10623-020-00831-x","type":"journal-article","created":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T16:06:06Z","timestamp":1621440366000},"page":"1575-1614","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Novel generic construction of leakage-resilient PKE scheme with CCA security"],"prefix":"10.1007","volume":"89","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7254-3579","authenticated-orcid":false,"given":"Yanwei","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Bo","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Mingwu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,19]]},"reference":[{"key":"831_CR1","doi-asserted-by":"crossref","unstructured":"Alwen J., Yevgeniy D., Wichs D.: Leakage-resilient public-key cryptography in the bounded-retrieval model. In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16\u201320, 2009. Proceedings, pp. 36\u201354 (2009)","DOI":"10.1007\/978-3-642-03356-8_3"},{"key":"831_CR2","doi-asserted-by":"crossref","unstructured":"Alwen J., Dodis Y., Naor M., Segev G., Walfish S., Wichs D.: Publickey encryption in the bounded-retrieval model. In Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30\u2013June 3, 2010. Proceedings, pp. 113\u2013134 (2010).","DOI":"10.1007\/978-3-642-13190-5_6"},{"key":"831_CR3","doi-asserted-by":"crossref","unstructured":"Boneh D., Boyen X.: Efficient selective-id secure identity-based encryption without random oracles. In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2\u20136, 2004, Proceedings, pp. 223\u2013238 (2004)","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"831_CR4","doi-asserted-by":"crossref","unstructured":"Boneh D., Katz J.: Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. In: Topics in Cryptology - CT-RSA 2005, The Cryptographers\u2019 Track at the RSA Conference 2005, San Francisco, CA, USA, February 14\u201318, 2005, pp. 87\u2013103 (2005)","DOI":"10.1007\/978-3-540-30574-3_8"},{"key":"831_CR5","doi-asserted-by":"crossref","unstructured":"Canetti R., Halevi S., Katz J.: Chosen-ciphertext security from identity-based encryption. In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2\u20136, 2004, pp. 207\u2013222 (2004)","DOI":"10.1007\/978-3-540-24676-3_13"},{"key":"831_CR6","doi-asserted-by":"crossref","unstructured":"Chen R., Mu Y., Yang G., Susilo W., Guo F.: Strongly leakage-resilient authenticated key exchange. In: Topics in Cryptology - CT-RSA 2016 - The Cryptographers\u2019 Track at the RSA Conference 2016, San Francisco, CA, USA, February 29\u2013March 4, 2016, Proceedings, pp. 19\u201336 (2016)","DOI":"10.1007\/978-3-319-29485-8_2"},{"issue":"1","key":"831_CR7","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s10623-016-0295-3","volume":"85","author":"R Chen","year":"2017","unstructured":"Chen R., Yi M., Yang G., Susilo W., Guo F.: Strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptogr. 85(1), 145\u2013173 (2017).","journal-title":"Des. Codes Cryptogr."},{"key":"831_CR8","doi-asserted-by":"crossref","unstructured":"Chow S.S.M., Dodis Y., Rouselakis Y., Waters B.: Practical leakage-resilient identity-based encryption from simple assumptions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010, pp. 152\u2013161 (2010)","DOI":"10.1145\/1866307.1866325"},{"key":"831_CR9","doi-asserted-by":"crossref","unstructured":"Dodis Y., Haralambiev K., L\u00f3pez-Alt A., Wichs D.: Cryptography against continuous memory attacks. In: 51th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2010, October 23\u201326, 2010, Las Vegas, Nevada, USA, pp. 511\u2013520 (2010)","DOI":"10.1109\/FOCS.2010.56"},{"key":"831_CR10","doi-asserted-by":"crossref","unstructured":"Gentry C.: Practical identity-based encryption without random oracles. In: Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28\u2013June 1, 2006, Proceedings, pp. 445\u2013464 (2006)","DOI":"10.1007\/11761679_27"},{"key":"831_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.tcs.2017.10.020","volume":"711","author":"Y Guo","year":"2018","unstructured":"Guo Y., Li J., Yang L., Zhang Y., Zhang F.: Provably secure certificate-based encryption with leakage resilience. Theoret. Comput. Sci. 711, 1\u201310 (2018).","journal-title":"Theoret. Comput. Sci."},{"key":"831_CR12","doi-asserted-by":"publisher","DOI":"10.1201\/9781420010756","volume-title":"Introduction to Modern Cryptography","author":"J Katz","year":"2007","unstructured":"Katz J., Lindell Y.: Introduction to Modern Cryptography. Chapman & Hall\/CRC, Boca Raton (2007)."},{"key":"831_CR13","doi-asserted-by":"crossref","unstructured":"Lewko A.\u00a0B., Waters B.: New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9\u201311, 2010, pp. 455\u2013479 (2010)","DOI":"10.1007\/978-3-642-11799-2_27"},{"issue":"4","key":"831_CR14","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1007\/s10586-013-0253-z","volume":"16","author":"S Li","year":"2013","unstructured":"Li S., Zhang F., Sun Y., Shen L.: Efficient leakage-resilient public key encryption from DDH assumption. Clust. Comput. 16(4), 797\u2013806 (2013).","journal-title":"Clust. Comput."},{"issue":"10","key":"831_CR15","doi-asserted-by":"publisher","first-page":"1016","DOI":"10.1002\/sec.1396","volume":"9","author":"J Li","year":"2016","unstructured":"Li J., Guo Y., Qihong Yu, Yang L., Zhang Y.: Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage. Secur. Commun. Netw. 9(10), 1016\u20131024 (2016).","journal-title":"Secur. Commun. Netw."},{"issue":"7","key":"831_CR16","doi-asserted-by":"publisher","first-page":"1066","DOI":"10.1093\/comjnl\/bxv128","volume":"59","author":"J Li","year":"2016","unstructured":"Li J., Teng M., Zhang Y., Qihong Yu: A leakage-resilient CCA-secure identity-based encryption scheme. Comput. J. 59(7), 1066\u20131075 (2016).","journal-title":"Comput. J."},{"key":"831_CR17","doi-asserted-by":"crossref","unstructured":"Liu S., Weng J., Zhao Y.: Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks. In: Topics in Cryptology\u2014CT-RSA 2013\u2014The Cryptographers\u2019 Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings, pp. 84\u2013100 (2013)","DOI":"10.1007\/978-3-642-36095-4_6"},{"key":"831_CR18","doi-asserted-by":"crossref","unstructured":"Naor M., Segev G.: Public-key cryptosystems resilient to key leakage. In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16\u201320, 2009. Proceedings, pp. 18\u201335 (2009)","DOI":"10.1007\/978-3-642-03356-8_2"},{"issue":"18","key":"831_CR19","doi-asserted-by":"publisher","first-page":"3346","DOI":"10.1002\/sec.1258","volume":"8","author":"Yu Qihong","year":"2015","unstructured":"Qihong Yu, Li J., Zhang Y.: Leakage-resilient certificate-based encryption. Secur. Commun. Netw. 8(18), 3346\u20133355 (2015).","journal-title":"Secur. Commun. Netw."},{"key":"831_CR20","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.jss.2015.05.066","volume":"116","author":"Yu Qihong","year":"2016","unstructured":"Qihong Yu, Li J., Zhang Y., Wei W., Huang X., Xiang Y.: Certificate-based encryption resilient to key leakage. J. Syst. Softw. 116, 101\u2013112 (2016).","journal-title":"J. Syst. Softw."},{"key":"831_CR21","doi-asserted-by":"crossref","unstructured":"Qin B., Liu S.: Leakage-resilient chosen-ciphertext secure public-key encryption from hash proof system and one-time lossy filter. In: Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1\u20135, 2013, Proceedings, Part II, pp. 381\u2013400 (2013)","DOI":"10.1007\/978-3-642-42045-0_20"},{"issue":"1","key":"831_CR22","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1049\/iet-ifs.2013.0173","volume":"9","author":"B Qin","year":"2014","unstructured":"Qin B., Liu S., Chen K.: Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience. IET Inf. Secur. 9(1), 32\u201342 (2014).","journal-title":"IET Inf. Secur."},{"key":"831_CR23","doi-asserted-by":"crossref","unstructured":"Waters B.: Efficient identity-based encryption without random oracles. In: Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22\u201326, 2005, Proceedings, pp. 114\u2013127 (2005)","DOI":"10.1007\/11426639_7"},{"key":"831_CR24","doi-asserted-by":"crossref","unstructured":"Waters B.: Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16\u201320, 2009. Proceedings, pp. 619\u2013636 (2009)","DOI":"10.1007\/978-3-642-03356-8_36"},{"key":"831_CR25","doi-asserted-by":"crossref","unstructured":"Yang R., Xu Q., Zhou Y., Zhang R., Hu C., Yu Z.: Updatable hash proof system and its applications. In: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21\u201325, 2015, Proceedings, Part I, pp. 266\u2013285 (2015)","DOI":"10.1007\/978-3-319-24174-6_14"},{"issue":"12","key":"831_CR26","doi-asserted-by":"publisher","first-page":"2885","DOI":"10.1007\/s10623-019-00656-3","volume":"87","author":"G Yang","year":"2019","unstructured":"Yang G., Chen R., Yi M., Susilo W., Guo F., Li J.: Strongly leakage resilient authenticated key exchange, revisited. Des. Codes Cryptogr. 87(12), 2885\u20132911 (2019).","journal-title":"Des. Codes Cryptogr."},{"key":"831_CR27","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.dam.2015.10.018","volume":"204","author":"Y Zhou","year":"2016","unstructured":"Zhou Y., Yang B., Zhang W.: Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing. Discret. Appl. Math. 204, 185\u2013202 (2016).","journal-title":"Discret. Appl. Math."},{"key":"831_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.tcs.2018.11.019","volume":"772","author":"Y Zhou","year":"2019","unstructured":"Zhou Y., Yang B., Yi M.: The generic construction of continuous leakage-resilient identity-based cryptosystems. Theoret. Comput. Sci. 772, 1\u201345 (2019).","journal-title":"Theoret. Comput. Sci."},{"issue":"3","key":"831_CR29","doi-asserted-by":"publisher","first-page":"2818","DOI":"10.1109\/JSYST.2018.2878215","volume":"13","author":"Y Zhou","year":"2019","unstructured":"Zhou Y., Yang B., Xia Z., Yi M., Wang T.: Anonymous and updatable identity-based hash proof system. IEEE Syst. J. 13(3), 2818\u20132829 (2019).","journal-title":"IEEE Syst. J."},{"key":"831_CR30","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/j.tcs.2019.12.018","volume":"809","author":"Y Zhou","year":"2020","unstructured":"Zhou Y., Yang B., Xia Z., Zhang M., Yi M.: Identity-based encryption with leakage-amplified chosen-ciphertext attacks security. Theoret. Comput. Sci. 809, 277\u2013295 (2020).","journal-title":"Theoret. Comput. Sci."},{"key":"831_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.tcs.2019.10.031","volume":"804","author":"Y Zhou","year":"2020","unstructured":"Zhou Y., Yang B., Wang T., Yi M.: Novel updatable identity-based hash proof system and its applications. Theoret. Comput. Sci. 804, 1\u201328 (2020).","journal-title":"Theoret. Comput. Sci."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-020-00831-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-020-00831-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-020-00831-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T00:13:43Z","timestamp":1672186423000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-020-00831-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,19]]},"references-count":31,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["831"],"URL":"https:\/\/doi.org\/10.1007\/s10623-020-00831-x","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2021,5,19]]},"assertion":[{"value":"2 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 May 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}