{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T19:42:51Z","timestamp":1730230971882,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/icawst.2018.8517196","type":"proceedings-article","created":{"date-parts":[[2018,11,16]],"date-time":"2018-11-16T05:18:42Z","timestamp":1542345522000},"page":"251-256","source":"Crossref","is-referenced-by-count":1,"title":["Leakage-Resilient Certificate-based Encryption Scheme for IoT Environments"],"prefix":"10.1109","author":[{"given":"Yuh-Min","family":"Tseng","sequence":"first","affiliation":[]},{"given":"Jui-Di","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Ruo-Wei","family":"Hung","sequence":"additional","affiliation":[]},{"given":"Hung-Yu","family":"Chien","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","first-page":"296","article-title":"On the efficient implementation of pairing-based protocols","author":"scott","year":"2011","journal-title":"Proc Cryptography and Coding LNCS 7089"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.05.066"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1396"},{"key":"ref31","first-page":"117","article-title":"Identity-based encryption resilient to continual auxiliary leakage","author":"yuen","year":"2012","journal-title":"Proc EUROCRYPT'12 LNCS 7237"},{"key":"ref30","first-page":"501","article-title":"Cryptography resilient to continual memory leakage","author":"brakerski","year":"2010","journal-title":"In Proceedings of IEEE Annual Symposium on Foundations of Computer Science"},{"key":"ref37","first-page":"134","article-title":"Implementing cryptographic pairings on smart-cards","author":"scott","year":"2006","journal-title":"Proc CHES'06 LNCS 4249"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1580"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2017.10.020"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.03.032"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-013-0253-z"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-016-0121-x"},{"key":"ref12","first-page":"98","article-title":"Signature schemes secure against hard-to-invert leakage","author":"faust","year":"2012","journal-title":"Proc ASIACRYPT'12 LNCS 7658"},{"key":"ref13","first-page":"50","article-title":"A practical leakage-resilient signature scheme in the generic group model","author":"galindo","year":"2013","journal-title":"Proc SAC'12 LNCS 7707"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1007\/978-3-319-06320-1_31","article-title":"Efficient leakage-resilient signature schemes in the generic bilinear group model","author":"tang","year":"2014","journal-title":"Proc Information Security Practice and Experience LNCS 8434"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590317"},{"key":"ref16","first-page":"277","article-title":"Continuous after-the-fact leakage-resilient eck-secure key exchange","year":"2015","journal-title":"Proc IMA International Conference on Cryptography and Coding Boyd"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-016-0295-3"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2799298"},{"key":"ref19","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","author":"shamir","year":"1984","journal-title":"Proceedings of CRYPTO'84 LNCS 196"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"243","DOI":"10.5755\/j01.itc.45.3.12814","article-title":"A short certificate-based signature scheme with provable security","volume":"45","author":"hung","year":"2016","journal-title":"information technology and control"},{"key":"ref4","first-page":"388","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Proceedings of Crypto '99 LNCS 1666"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.01.013"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.714"},{"key":"ref6","first-page":"474","article-title":"Simultaneous hardcore bits and cryptography against memory attacks","author":"akavia","year":"2009","journal-title":"Proc TCC'09 LNCS 5444"},{"key":"ref29","first-page":"440","article-title":"Hierarchical identity-based encryption with constant size ciphertext","author":"boneh","year":"2005","journal-title":"Proc EUROCRYPT'05 LNCS 3494"},{"key":"ref5","first-page":"104","article-title":"Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems","author":"kocher","year":"1996","journal-title":"Proc CRYPTO'96 LNCS 1163"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1137\/100813464"},{"key":"ref7","first-page":"595","article-title":"Leakage resilient elgamal encryption","author":"kiltz","year":"2010","journal-title":"Proc ASIACRYPT'10 LNCS 6477"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SIoT.2016.010"},{"key":"ref9","first-page":"84","article-title":"Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks","author":"liu","year":"2013","journal-title":"Proc CTRSA'13 LNCS 7779"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref20","first-page":"213","article-title":"Identity-based encryption from the Weil pairing","author":"boneh","year":"2001","journal-title":"Crypto'01 LNCS 2139"},{"key":"ref22","first-page":"272","article-title":"Certificate-based encryption and the certificate revocation problem","author":"gentry","year":"2003","journal-title":"Proc Eurocrypt'03 LNCS 2656"},{"key":"ref21","first-page":"452","article-title":"Certificateless public key cryptography","author":"al-riyami","year":"2003","journal-title":"Proceedings of Asiacrypt 03 LNCS 2894"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2289271"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxr098"},{"key":"ref26","first-page":"1553","article-title":"Efficient certificate-based encryption scheme secure against key replacement attacks in the standard model","volume":"30","author":"lu","year":"2014","journal-title":"J Inf Sci Eng"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.09.009"}],"event":{"name":"2018 9th International Conference on Awareness Science and Technology (iCAST)","start":{"date-parts":[[2018,9,19]]},"location":"Fukuoka","end":{"date-parts":[[2018,9,21]]}},"container-title":["2018 9th International Conference on Awareness Science and Technology (iCAST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8501354\/8517185\/08517196.pdf?arnumber=8517196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:56:28Z","timestamp":1598230588000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8517196\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/icawst.2018.8517196","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}