{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T04:08:00Z","timestamp":1768709280854,"version":"3.49.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T00:00:00Z","timestamp":1692144000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T00:00:00Z","timestamp":1692144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["61802242"],"award-info":[{"award-number":["61802242"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s10623-023-01268-8","type":"journal-article","created":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T12:02:15Z","timestamp":1692187335000},"page":"3757-3801","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Leakage-resilient identity-based cryptography from minimal assumptions"],"prefix":"10.1007","volume":"91","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7254-3579","authenticated-orcid":false,"given":"Yanwei","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Bo","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zirui","family":"Qiao","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Mingwu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,16]]},"reference":[{"key":"1268_CR1","doi-asserted-by":"crossref","unstructured":"Alwen J., Dodis Y., Naor M., Segev G., Walfish S., Wichs D.: Public-key encryption in the bounded-retrieval model. In: Advances in Cryptology-EUROCRYPT 2010, volume 6110 of LNCS, pp. 113\u2013134. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-13190-5_6"},{"key":"1268_CR2","doi-asserted-by":"crossref","unstructured":"Chen R.,\u00a0Mu Y., Yang G., Susilo W., Guo F.: Strongly leakage-resilient authenticated key exchange. In: Topics in Cryptology-CT-RSA 2016, volume 9610 of LNCS, pp. 19\u201336. Springer (2016)","DOI":"10.1007\/978-3-319-29485-8_2"},{"key":"1268_CR3","doi-asserted-by":"crossref","unstructured":"Chow Sherman S.M., Dodis Y., Rouselakis Y., Waters B.: Practical leakage-resilient identity-based encryption from simple assumptions. In: Conference on Computer and Communications Security-CCS 2010, pp. 152\u2013161. ACM (2010)","DOI":"10.1145\/1866307.1866325"},{"key":"1268_CR4","doi-asserted-by":"crossref","unstructured":"Cramer R., Shoup V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Advances in Cryptology -EUROCRYPT 2002, volume 2332 of LNCS, pp. 45\u201364. Springer (2002)","DOI":"10.1007\/3-540-46035-7_4"},{"key":"1268_CR5","doi-asserted-by":"crossref","unstructured":"Dodis Y., Haralambiev K., L\u00f3pez-Alt A., Wichs D.: Cryptography against continuous memory attacks. In: FOCS 2010, pp. 511\u2013520. IEEE (2010)","DOI":"10.1109\/FOCS.2010.56"},{"key":"1268_CR6","first-page":"1","volume":"8","author":"A Fu","year":"2017","unstructured":"Fu A., Yu S., Zhang Y., Wang H., Huang C.: NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Trans. Big Data 8, 1\u201310 (2017).","journal-title":"IEEE Trans. Big Data"},{"key":"1268_CR7","doi-asserted-by":"crossref","unstructured":"Gentry C.: Practical identity-based encryption without random oracles. In: Advances in Cryptology-EUROCRYPT 2006, volume 4004 of LNCS, pp. 445\u2013464. Springer (2006)","DOI":"10.1007\/11761679_27"},{"key":"1268_CR8","doi-asserted-by":"crossref","unstructured":"Hazay C., L\u00f3pez-Alt A., Wee H., Wichs D.: Leakage-resilient cryptography from minimal assumptions. In: Advances in Cryptology-EUROCRYPT 2013, volume 7881 of LNCS, pp. 160\u2013176. Springer (2013)","DOI":"10.1007\/978-3-642-38348-9_10"},{"issue":"5","key":"1268_CR9","doi-asserted-by":"publisher","first-page":"8372","DOI":"10.1109\/JIOT.2019.2917223","volume":"6","author":"B Kuang","year":"2019","unstructured":"Kuang B., Anmin F., Shui Yu., Yang G., Mang S., Zhang Y.: ESDRA: an efficient and secure distributed remote attestation scheme for IoT swarms. IEEE Internet Things J. 6(5), 8372\u20138383 (2019).","journal-title":"IEEE Internet Things J."},{"key":"1268_CR10","first-page":"1","volume":"355\u2013356","author":"J Li","year":"2016","unstructured":"Li J., Guo Y., Qihong Yu., Yang L., Zhang Y., Zhang F.: Continuous leakage-resilient certificate-based encryption. Inf. Sci. 355\u2013356, 1\u201314 (2016).","journal-title":"Inf. Sci."},{"issue":"10","key":"1268_CR11","doi-asserted-by":"publisher","first-page":"1016","DOI":"10.1002\/sec.1396","volume":"9","author":"J Li","year":"2016","unstructured":"Li J., Guo Y., Qihong Yu., Yang L., Zhang Y.: Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage. Secur. Commun. Netw. 9(10), 1016\u20131024 (2016).","journal-title":"Secur. Commun. Netw."},{"issue":"7","key":"1268_CR12","doi-asserted-by":"publisher","first-page":"1066","DOI":"10.1093\/comjnl\/bxv128","volume":"59","author":"J Li","year":"2016","unstructured":"Li J., Teng M., Zhang Y., Qihong Yu.: A leakage-resilient CCA-secure identity-based encryption scheme. Comput. J. 59(7), 1066\u20131075 (2016).","journal-title":"Comput. J."},{"issue":"3","key":"1268_CR13","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.ins.2017.11.008","volume":"429","author":"J Li","year":"2018","unstructured":"Li J., Qihong Yu., Zhang Y.: Identity-based broadcast encryption with continuous leakage resilience. Inf. Sci. 429(3), 177\u2013193 (2018).","journal-title":"Inf. Sci."},{"key":"1268_CR14","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.ins.2019.01.052","volume":"484","author":"J Li","year":"2019","unstructured":"Li J., Qihong Yu., Zhang Y.: Hierarchical attribute based encryption with continuous leakage-resilience. Inf. Sci. 484, 113\u2013134 (2019).","journal-title":"Inf. Sci."},{"key":"1268_CR15","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.ins.2018.07.077","volume":"470","author":"J Li","year":"2019","unstructured":"Li J., Qihong Yu., Zhang Y., Shen J.: Key-policy attribute-based encryption against continual auxiliary input leakage. Inf. Sci. 470, 175\u2013188 (2019).","journal-title":"Inf. Sci."},{"key":"1268_CR16","doi-asserted-by":"crossref","unstructured":"Liu S., Weng J., Zhao Y.: Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks. In: CT-RSA 2013, volume 7779 of LNCS, pp. 84\u2013100. Springer (2013)","DOI":"10.1007\/978-3-642-36095-4_6"},{"key":"1268_CR17","doi-asserted-by":"crossref","unstructured":"Naor M., Segev G.: Public-key cryptosystems resilient to key leakage. In: Advances in Cryptology -CRYPTO 2009, volume 5677 of LNCS, pp. 18\u201335. Springer (2009)","DOI":"10.1007\/978-3-642-03356-8_2"},{"issue":"18","key":"1268_CR18","doi-asserted-by":"publisher","first-page":"3346","DOI":"10.1002\/sec.1258","volume":"8","author":"Yu Qihong","year":"2015","unstructured":"Qihong Yu., Li J., Zhang Y.: Leakage-resilient certificate-based encryption. Secur. Commun. Netw. 8(18), 3346\u20133355 (2015).","journal-title":"Secur. Commun. Netw."},{"key":"1268_CR19","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.jss.2015.05.066","volume":"116","author":"Yu Qihong","year":"2016","unstructured":"Qihong Yu., Li J., Zhang Y., Wei W., Huang X., Xiang Y.: Certificate-based encryption resilient to key leakage. J. Syst. Softw. 116, 101\u2013112 (2016).","journal-title":"J. Syst. Softw."},{"key":"1268_CR20","doi-asserted-by":"crossref","unstructured":"Qin B., Liu S.: Leakage-resilient chosen-ciphertext secure public-key encryption from hash proof system and one-time lossy filter. In: Advances in Cryptology-ASIACRYPT 2013, volume 8270 of LNCS, pp. 381\u2013400. Springer (2013)","DOI":"10.1007\/978-3-642-42045-0_20"},{"key":"1268_CR21","doi-asserted-by":"crossref","unstructured":"Qin B., Liu S.: Leakage-flexible CCA-secure public-key encryption: simple construction and free of pairing. In: Public-Key Cryptography-PKC 2014, volume 8383 of LNCS, pp. 19\u201336. Springer (2014)","DOI":"10.1007\/978-3-642-54631-0_2"},{"issue":"2","key":"1268_CR22","doi-asserted-by":"publisher","first-page":"2017","DOI":"10.1109\/JSYST.2017.2685524","volume":"12","author":"O Ruan","year":"2018","unstructured":"Ruan O., Zhang Y., Zhang M., Zhou J., Harn L.: After-the-fact leakage-resilient identity-based authenticated key exchange. IEEE Syst. J. 12(2), 2017\u20132026 (2018).","journal-title":"IEEE Syst. J."},{"key":"1268_CR23","doi-asserted-by":"crossref","unstructured":"Waters B.: Efficient identity-based encryption without random oracles. In: Advances in Cryptology- EUROCRYPT 2005, volume 3494 of LNCS, pp. 114\u2013127. Springer (2005)","DOI":"10.1007\/11426639_7"},{"key":"1268_CR24","doi-asserted-by":"crossref","unstructured":"Waters B.: Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. In: Advances in Cryptology-CRYPTO 2009, volume 5677 of LNCS, pp. 619\u2013636. Springer (2009)","DOI":"10.1007\/978-3-642-03356-8_36"},{"key":"1268_CR25","doi-asserted-by":"crossref","unstructured":"Yang R., Xu Q., Zhou Y., Zhang R., Hu C., Yu Z.: Updatable hash proof system and its applications. In: European Symposium on Research in Computer Security-ESORICS 2015, volume 9326 of LNCS, pp. 266\u2013285. Springer (2015)","DOI":"10.1007\/978-3-319-24174-6_14"},{"key":"1268_CR26","doi-asserted-by":"crossref","unstructured":"Yuen T.H., Chow Sherman S.M., Zhang Y., Yiu S.-M.: Identity-based encryption resilient to continual auxiliary leakage. In: Advances in Cryptology -EUROCRYPT 2012, volume 7237 of LNCS, pp. 117\u2013134. Springer (2012)","DOI":"10.1007\/978-3-642-29011-4_9"},{"key":"1268_CR27","doi-asserted-by":"crossref","unstructured":"Zhang M., Shi W., Wang C., Chen Z., Mu Y.: Leakage-resilient attribute-based encryption with fast decryption: models, analysis and constructions. In: Information Security Practice and Experience\u20149th International Conference, ISPEC 2013, Lanzhou, China, May 12\u201314, 2013, pp. 75\u201390. (2013)","DOI":"10.1007\/978-3-642-38033-4_6"},{"issue":"4","key":"1268_CR28","first-page":"541","volume":"60","author":"L Zhang","year":"2017","unstructured":"Zhang L., Zhang J., Yi M.: Novel leakage-resilient attribute-based encryption from hash proof system. Comput. J. 60(4), 541\u2013554 (2017).","journal-title":"Comput. J."},{"issue":"6","key":"1268_CR29","doi-asserted-by":"publisher","first-page":"1339","DOI":"10.1007\/s10623-017-0399-4","volume":"86","author":"J Zhang","year":"2018","unstructured":"Zhang J., Chen J., Gong J., Ge A., Ma C.: Leakage-resilient attribute based encryption in prime-order groups via predicate encodings. Des. Codes Cryptogr. 86(6), 1339\u20131366 (2018).","journal-title":"Des. Codes Cryptogr."},{"key":"1268_CR30","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.knosys.2017.08.019","volume":"136","author":"Y Zhou","year":"2017","unstructured":"Zhou Y., Yang B.: Continuous leakage-resilient certificateless public key encryption with CCA security. Knowl. Based Syst. 136, 27\u201336 (2017).","journal-title":"Knowl. Based Syst."},{"issue":"8","key":"1268_CR31","doi-asserted-by":"crossref","first-page":"1161","DOI":"10.1093\/comjnl\/bxx017","volume":"60","author":"Y Zhou","year":"2017","unstructured":"Zhou Y., Yang B.: Continuous leakage-resilient public-key encryption scheme with CCA security. Comput. J. 60(8), 1161\u20131172 (2017).","journal-title":"Comput. J."},{"key":"1268_CR32","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ipl.2017.09.012","volume":"130","author":"Y Zhou","year":"2018","unstructured":"Zhou Y., Yang B.: Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing. Inf. Process. Lett. 130, 16\u201324 (2018).","journal-title":"Inf. Process. Lett."},{"key":"1268_CR33","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.dam.2015.10.018","volume":"204","author":"Y Zhou","year":"2016","unstructured":"Zhou Y., Yang B., Zhang W.: Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing. Discret. Appl. Math. 204, 185\u2013202 (2016).","journal-title":"Discret. Appl. Math."},{"issue":"17","key":"1268_CR34","doi-asserted-by":"publisher","first-page":"4505","DOI":"10.1002\/sec.1643","volume":"9","author":"Y Zhou","year":"2016","unstructured":"Zhou Y., Yang B., Zhang W., Yi M.: CCA2 secure public-key encryption scheme tolerating continual leakage attacks. Secur. Commun. Netw. 9(17), 4505\u20134519 (2016).","journal-title":"Secur. Commun. Netw."},{"issue":"4","key":"1268_CR35","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1631\/FITEE.1601849","volume":"19","author":"Y Zhou","year":"2018","unstructured":"Zhou Y., Yang B., Cheng H., Wang Q.: A leakage-resilient certificateless public key encryption scheme with CCA2 security. Front. Inf. Technol. Electr. Eng. 19(4), 481\u2013493 (2018).","journal-title":"Front. Inf. Technol. Electr. Eng."},{"key":"1268_CR36","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.adhoc.2018.07.001","volume":"80","author":"Y Zhou","year":"2018","unstructured":"Zhou Y., Yang B., Yi M., Xia Z.: Continuous leakage-resilient access control for wireless sensor networks. Ad Hoc Netw. 80, 41\u201353 (2018).","journal-title":"Ad Hoc Netw."},{"issue":"4","key":"1268_CR37","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1093\/comjnl\/bxy003","volume":"61","author":"Y Zhou","year":"2018","unstructured":"Zhou Y., Yang B., Yi M.: Continuous leakage-resilient identity-based encryption without random oracles. Comput. J. 61(4), 586\u2013600 (2018).","journal-title":"Comput. J."},{"key":"1268_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.tcs.2018.11.019","volume":"772","author":"Y Zhou","year":"2019","unstructured":"Zhou Y., Yang B., Yi M.: The generic construction of continuous leakage-resilient identity-based cryptosystems. Theoret. Comput. Sci. 772, 1\u201345 (2019).","journal-title":"Theoret. Comput. Sci."},{"issue":"3","key":"1268_CR39","doi-asserted-by":"publisher","first-page":"2818","DOI":"10.1109\/JSYST.2018.2878215","volume":"13","author":"Y Zhou","year":"2019","unstructured":"Zhou Y., Yang B., Xia Z., Yi M., Wang T.: Anonymous and updatable identity-based hash proof system. IEEE Syst. J. 13(3), 2818\u20132829 (2019).","journal-title":"IEEE Syst. J."},{"issue":"7","key":"1268_CR40","doi-asserted-by":"publisher","first-page":"1575","DOI":"10.1007\/s10623-020-00831-x","volume":"89","author":"Y Zhou","year":"2021","unstructured":"Zhou Y., Yang B., Xia Z., Zhang M., Yi M.: Novel generic construction of leakage-resilient PKE scheme with CCA security. Des. Codes Cryptogr. 89(7), 1575\u20131614 (2021).","journal-title":"Des. Codes Cryptogr."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-023-01268-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-023-01268-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-023-01268-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T19:17:16Z","timestamp":1698175036000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-023-01268-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,16]]},"references-count":40,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["1268"],"URL":"https:\/\/doi.org\/10.1007\/s10623-023-01268-8","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,16]]},"assertion":[{"value":"17 July 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 August 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}