{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:44:05Z","timestamp":1740149045130,"version":"3.37.3"},"reference-count":36,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,6,28]],"date-time":"2020-06-28T00:00:00Z","timestamp":1593302400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902140","60573026","61972095","U1736112","1908085QF288","1708085QF154","KJ2018A0398","KJ2018A0678","KJ2018A0396","KJ2019A0605"],"award-info":[{"award-number":["61902140","60573026","61972095","U1736112","1908085QF288","1708085QF154","KJ2018A0398","KJ2018A0678","KJ2018A0396","KJ2019A0605"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902140","60573026","61972095","U1736112","1908085QF288","1708085QF154","KJ2018A0398","KJ2018A0678","KJ2018A0396","KJ2019A0605"],"award-info":[{"award-number":["61902140","60573026","61972095","U1736112","1908085QF288","1708085QF154","KJ2018A0398","KJ2018A0678","KJ2018A0396","KJ2019A0605"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902140","60573026","61972095","U1736112","1908085QF288","1708085QF154","KJ2018A0398","KJ2018A0678","KJ2018A0396","KJ2019A0605"],"award-info":[{"award-number":["61902140","60573026","61972095","U1736112","1908085QF288","1708085QF154","KJ2018A0398","KJ2018A0678","KJ2018A0396","KJ2019A0605"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902140","60573026","61972095","U1736112","1908085QF288","1708085QF154","KJ2018A0398","KJ2018A0678","KJ2018A0396","KJ2019A0605"],"award-info":[{"award-number":["61902140","60573026","61972095","U1736112","1908085QF288","1708085QF154","KJ2018A0398","KJ2018A0678","KJ2018A0396","KJ2019A0605"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003995","name":"Natural Science Foundation of Anhui Province","doi-asserted-by":"publisher","award":["61902140","60573026","61972095","U1736112","1908085QF288","1708085QF154","KJ2018A0398","KJ2018A0678","KJ2018A0396","KJ2019A0605"],"award-info":[{"award-number":["61902140","60573026","61972095","U1736112","1908085QF288","1708085QF154","KJ2018A0398","KJ2018A0678","KJ2018A0396","KJ2019A0605"]}],"id":[{"id":"10.13039\/501100003995","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003995","name":"Natural Science Foundation of Anhui Province","doi-asserted-by":"publisher","award":["61902140","60573026","61972095","U1736112","1908085QF288","1708085QF154","KJ2018A0398","KJ2018A0678","KJ2018A0396","KJ2019A0605"],"award-info":[{"award-number":["61902140","60573026","61972095","U1736112","1908085QF288","1708085QF154","KJ2018A0398","KJ2018A0678","KJ2018A0396","KJ2019A0605"]}],"id":[{"id":"10.13039\/501100003995","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Nature Science Foundation of Anhui Higher Education Institutions","award":["61902140","60573026","61972095","U1736112","1908085QF288","1708085QF154","KJ2018A0398","KJ2018A0678","KJ2018A0396","KJ2019A0605"],"award-info":[{"award-number":["61902140","60573026","61972095","U1736112","1908085QF288","1708085QF154","KJ2018A0398","KJ2018A0678","KJ2018A0396","KJ2019A0605"]}]},{"name":"Nature Science Foundation of Anhui Higher Education Institutions","award":["61902140","60573026","61972095","U1736112","1908085QF288","1708085QF154","KJ2018A0398","KJ2018A0678","KJ2018A0396","KJ2019A0605"],"award-info":[{"award-number":["61902140","60573026","61972095","U1736112","1908085QF288","1708085QF154","KJ2018A0398","KJ2018A0678","KJ2018A0396","KJ2019A0605"]}]},{"name":"Nature Science Foundation of Anhui Higher Education Institutions","award":["61902140","60573026","61972095","U1736112","1908085QF288","1708085QF154","KJ2018A0398","KJ2018A0678","KJ2018A0396","KJ2019A0605"],"award-info":[{"award-number":["61902140","60573026","61972095","U1736112","1908085QF288","1708085QF154","KJ2018A0398","KJ2018A0678","KJ2018A0396","KJ2019A0605"]}]},{"name":"Nature Science Foundation of Anhui Higher Education Institutions","award":["61902140","60573026","61972095","U1736112","1908085QF288","1708085QF154","KJ2018A0398","KJ2018A0678","KJ2018A0396","KJ2019A0605"],"award-info":[{"award-number":["61902140","60573026","61972095","U1736112","1908085QF288","1708085QF154","KJ2018A0398","KJ2018A0678","KJ2018A0396","KJ2019A0605"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,6,28]]},"abstract":"<jats:p>The security for many certificate-based encryption schemes was considered under the ideal condition, where the attackers rarely have the secret state for the solutions. However, with a side-channel attack, attackers can obtain partial secret values of the schemes. In order to make the scheme more practical, the security model for the certificate-based encryption which is resilient to continual leakage is first formalized. The attackers in the security model are permitted to get some secret information continuously through the side-channel attack. Based on the certificate-based key encapsulation scheme, a novel certificate-based encryption scheme is proposed, which is resilient to the continual leakage. In the standard model, the new scheme we propose is proved to be secure under the decisional truncated <jats:italic>q<\/jats:italic>-augmented bilinear Diffie\u2013Hellman exponent hard problem and the decisional 1-bilinear Diffie\u2013Hellman inversion hard problem. Additionally, the new scheme can resist the chosen-ciphertext attack. Moreover, a comparison is performed with other related schemes, where the proposed solution further considers the continual leakage-resilient property and exhibits less computation cost.<\/jats:p>","DOI":"10.1155\/2020\/1492681","type":"journal-article","created":{"date-parts":[[2020,6,28]],"date-time":"2020-06-28T23:30:24Z","timestamp":1593387024000},"page":"1-11","source":"Crossref","is-referenced-by-count":0,"title":["Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model"],"prefix":"10.1155","volume":"2020","author":[{"given":"Yuyan","family":"Guo","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Huaibei Normal University, Huaibei 235000, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6532-2081","authenticated-orcid":true,"given":"Jiguo","family":"Li","sequence":"additional","affiliation":[{"name":"College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350117, China"}]},{"given":"Mingming","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Huaibei Normal University, Huaibei 235000, Anhui, China"}]},{"given":"Lei","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Huaibei Normal University, Huaibei 235000, Anhui, China"}]},{"given":"Shimin","family":"Wei","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Huaibei Normal University, Huaibei 235000, Anhui, China"}]}],"member":"311","reference":[{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.09.009"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxr130"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2017.10.020"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1258"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.05.066"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.06.049"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.04.067"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.3233\/jcs-2009-0366"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.08.014"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.01.013"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2012.01.006"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxy144"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-019-00605-0"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2018.11.019"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2018.5203"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2019.12.018"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2016.2520932"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2667679"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2017.2710190"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2016.2542813"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.2975184"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2018.2877748"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2015.2435518"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-017-0399-4"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.07.077"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.01.052"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.08.019"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.03.032"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-016-0295-3"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-017-0386-9"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-019-00656-3"},{"issue":"7","key":"49","first-page":"1497","volume":"51","year":"2014","journal-title":"Journal of Computer Research and Development"},{"year":"2012","key":"50"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2943379"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.2965065"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/1492681.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/1492681.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/1492681.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,28]],"date-time":"2020-06-28T23:30:34Z","timestamp":1593387034000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/1492681\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,28]]},"references-count":36,"alternative-id":["1492681","1492681"],"URL":"https:\/\/doi.org\/10.1155\/2020\/1492681","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2020,6,28]]}}}