{"id":"https://openalex.org/W2794013960","doi":"https://doi.org/10.1093/comjnl/bxy003","title":"Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles","display_name":"Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles","publication_year":2018,"publication_date":"2018-01-08","ids":{"openalex":"https://openalex.org/W2794013960","doi":"https://doi.org/10.1093/comjnl/bxy003","mag":"2794013960"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxy003","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxy003","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058920105","display_name":"Yanwei Zhou","orcid":"https://orcid.org/0000-0002-7254-3579"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I88830068","display_name":"Shaanxi Normal University","ror":"https://ror.org/0170z8493","country_code":"CN","type":"education","lineage":["https://openalex.org/I88830068"]}],"countries":["AU","CN"],"is_corresponding":false,"raw_author_name":"Yanwei Zhou","raw_affiliation_strings":["School of Computer Science, Shaanxi Normal University, Xi\u2019an, China","School of Computing and Information Technology, University of Wollongong, Wollongong, Australia","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Computer Science, Shaanxi Normal University, Xi'an, China"],"raw_orcid":"https://orcid.org/0000-0002-7254-3579","affiliations":[{"raw_affiliation_string":"School of Computer Science, Shaanxi Normal University, Xi\u2019an, China","institution_ids":["https://openalex.org/I88830068"]},{"raw_affiliation_string":"School of Computing and Information Technology, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Computer Science, Shaanxi Normal University, Xi'an, China","institution_ids":["https://openalex.org/I88830068"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000988425","display_name":"Bo Yang","orcid":"https://orcid.org/0000-0002-0419-1209"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I88830068","display_name":"Shaanxi Normal University","ror":"https://ror.org/0170z8493","country_code":"CN","type":"education","lineage":["https://openalex.org/I88830068"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bo Yang","raw_affiliation_strings":["School of Computer Science, Shaanxi Normal University, Xi\u2019an, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Computer Science, Shaanxi Normal University, Xi'an, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shaanxi Normal University, Xi\u2019an, China","institution_ids":["https://openalex.org/I88830068"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Computer Science, Shaanxi Normal University, Xi'an, China","institution_ids":["https://openalex.org/I88830068"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008178136","display_name":"Yi Mu","orcid":"https://orcid.org/0000-0002-1637-845X"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yi Mu","raw_affiliation_strings":["School of Computing and Information Technology, University of Wollongong, Wollongong, Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computing and Information Technology, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5000988425"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I88830068"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":3.0461,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.93096229,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"61","issue":"4","first_page":"586","last_page":"600"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.6365501284599304},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.605265736579895},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5720108151435852},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5381646156311035},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.5063740015029907},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4931139647960663},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4899851381778717},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4495686888694763},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.42222917079925537},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36147546768188477},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.31792280077934265},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.063559889793396}],"concepts":[{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.6365501284599304},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.605265736579895},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5720108151435852},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5381646156311035},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.5063740015029907},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4931139647960663},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4899851381778717},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4495686888694763},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.42222917079925537},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36147546768188477},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.31792280077934265},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.063559889793396},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1093/comjnl/bxy003","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxy003","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},{"id":"pmh:oai:ro.uow.edu.au:eispapers1-2293","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/eispapers1/1291","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty of Engineering and Information Sciences - Papers: Part B","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7099999785423279}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1982239665","https://openalex.org/W2149345136","https://openalex.org/W2260504727","https://openalex.org/W2307477252","https://openalex.org/W2409528574","https://openalex.org/W2544848865","https://openalex.org/W2570008916","https://openalex.org/W6698411196"],"related_works":["https://openalex.org/W3034924094","https://openalex.org/W1488708774","https://openalex.org/W3094954546","https://openalex.org/W2981906196","https://openalex.org/W1513698804","https://openalex.org/W4310560702","https://openalex.org/W2029712093","https://openalex.org/W1982811510","https://openalex.org/W4255503743","https://openalex.org/W1611563112"],"abstract_inverted_index":{"Provably":[0],"secure":[1],"identity-based":[2],"encryption":[3],"(IBE)":[4],"schemes":[5,53],"in":[6,24,62,111,122,162,167],"the":[7,25,35,39,47,57,63,75,81,85,88,94,112,123,129,145,152,156,163,168,178,184,188],"presence":[8],"of":[9,15,20,49,59,78,91,104,131,174],"key-leakage":[10],"have":[11],"attracted":[12],"a":[13,72,101,138],"lot":[14],"attention":[16],"recently.":[17],"However,":[18],"most":[19,48],"them":[21],"were":[22],"designed":[23],"bounded-leakage":[26],"model,":[27],"and":[28,117],"might":[29],"not":[30,55],"be":[31,69],"able":[32],"to":[33],"meet":[34],"claimed":[36],"security":[37,119,125],"under":[38],"continuous-leakage":[40,109],"attacks.":[41],"The":[42,171],"main":[43],"issue":[44],"is":[45,115,120,137,177,183],"that":[46],"previous":[50,189],"leakage-resilient":[51,190],"IBE":[52,106,191],"could":[54],"ensure":[56],"randomness":[58],"all":[60,160],"elements":[61,67,161],"ciphertext,":[64,158],"because":[65],"some":[66],"can":[68,83],"written":[70],"as":[71],"function":[73],"on":[74,87,128,151],"private":[76,89,153],"key":[77,90,154,179],"user;":[79],"therefore,":[80],"adversary":[82,146],"obtain":[84,148],"leakage":[86,150,180],"user":[92],"from":[93,155],"corresponding":[95,157],"given":[96],"ciphertext.":[97],"In":[98,142],"this":[99],"paper,":[100],"new":[102],"construction":[103],"CCA-secure":[105],"scheme":[107],"tolerating":[108],"attacks":[110],"standard":[113],"model":[114,126],"proposed,":[116],"its":[118],"proved":[121],"selective-ID":[124],"based":[127],"hardness":[130],"decisional":[132],"bilinear":[133],"Diffie\u2013Hellman":[134],"assumption,":[135],"which":[136,182],"classical":[139],"static":[140],"assumption.":[141],"our":[143,175],"construction,":[144],"cannot":[147],"any":[149],"since":[159],"ciphertext":[164],"are":[165],"random":[166],"adversary\u2019s":[169],"view.":[170],"striking":[172],"advantage":[173],"constructions":[176],"ratio,":[181],"best":[185],"one":[186],"among":[187],"constructions.":[192]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
