Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps
暂无分享,去创建一个
Rong Hao | Fanyu Kong | Jia Yu | Xiangguo Cheng | Guowen Li | Fanyu Kong | Jia Yu | Xiangguo Cheng | Rong Hao | Guowen Li
[1] David Naccache,et al. Topics in Cryptology — CT-RSA 2001 , 2001, Lecture Notes in Computer Science.
[2] Hugo Krawczyk,et al. Simple forward-secure signatures from any signature scheme , 2000, IACR Cryptol. ePrint Arch..
[3] Tatsuaki Okamoto. Topics in Cryptology – CT-RSA 2004 , 2004, Lecture Notes in Computer Science.
[4] Yuliang Zheng,et al. Advances in Cryptology — ASIACRYPT 2002 , 2002, Lecture Notes in Computer Science.
[5] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[6] Rong Hao,et al. Forward Secure Threshold Signature Scheme from Bilinear Pairings , 2006, CIS.
[7] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[8] Gene Itkis,et al. Forward-Secure Signatures with Optimal Signing and Verifying , 2001, CRYPTO.
[9] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[10] Piotr Indyk,et al. A small approximately min-wise independent family of hash functions , 1999, SODA '99.
[11] Moti Yung,et al. Parallel Key-Insulated Public Key Encryption Without Random Oracles , 2007, Public Key Cryptography.
[12] Leonid Reyzin,et al. Forward-Secure Signatures with Fast Key Update , 2002, SCN.
[13] Marc Joye,et al. Topics in Cryptology — CT-RSA 2003 , 2003 .
[14] Hovav Shacham,et al. Available from the IACR Cryptology ePrint Archive as Report 2006/297. Forward-Secure Signatures with Untrusted Update , 2006 .
[15] Shouhuai Xu,et al. Key-Insulated Public Key Cryptosystems , 2002, EUROCRYPT.
[16] Moti Yung,et al. Forward-secure signatures in untrusted update environments: efficient and generic constructions , 2007, CCS '07.
[17] Mihir Bellare,et al. Forward-Security in Private-Key Cryptography , 2003, CT-RSA.
[18] Hong Wang,et al. Cryptanalysis of Tzeng-Tzeng Forward-Secure Signature Schemes , 2006, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[19] Yvo Desmedt. Public Key Cryptography — PKC 2003 , 2002, Lecture Notes in Computer Science.
[20] Fei Hu,et al. A New Forward Secure Signature Scheme using Bilinear Maps , 2003, IACR Cryptol. ePrint Arch..
[21] Ross J. Anderson,et al. Two remarks on public key cryptology , 2002 .
[22] Tatsuaki Okamoto,et al. Advances in Cryptology — ASIACRYPT 2000 , 2000, Lecture Notes in Computer Science.
[23] Wen-Guey Tzeng,et al. Robust Forward-Secure Signature Schemes with Proactive Security , 2001, Public Key Cryptography.
[24] Aggelos Kiayias,et al. Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.
[25] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[26] Tal Malkin,et al. Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods , 2002, EUROCRYPT.
[27] Ran Canetti,et al. A Forward-Secure Public-Key Encryption Scheme , 2003, Journal of Cryptology.
[28] Mihir Bellare,et al. A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.
[29] Seungjoo Kim,et al. Information Security and Cryptology - ICISC 2005 , 2005, Lecture Notes in Computer Science.
[30] Leonid Reyzin,et al. A New Forward-Secure Digital Signature Scheme , 2000, ASIACRYPT.
[31] Gene Itkis,et al. SiBIR: Signer-Base Intrusion-Resilient Signatures , 2002, CRYPTO.
[32] Tatsuaki Okamoto,et al. Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings , 2007, Public Key Cryptography.
[33] Moti Yung,et al. Advances in Cryptology — CRYPTO 2002 , 2002, Lecture Notes in Computer Science.
[34] Chanathip Namprempre,et al. Forward-Secure Threshold Signature Schemes , 2001, CT-RSA.
[35] Gene Itkis,et al. Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions , 2002, SCN.
[36] Jan Camenisch,et al. Fine-grained forward-secure signature schemes without random oracles , 2006, Discret. Appl. Math..
[37] Je Hong Park,et al. A New Forward Secure Signature Scheme , 2004, IACR Cryptol. ePrint Arch..
[38] Kwangjo Kim,et al. Yet Another Forward Secure Signature from Bilinear Pairings , 2005, ICISC.
[39] Yuan Zhou,et al. Identity Based Key Insulated Signature , 2006, ISPEC.
[40] Matthew K. Franklin,et al. A Generic Construction for Intrusion-Resilient Public-Key Encryption , 2004, CT-RSA.
[41] Shouhuai Xu,et al. Strong Key-Insulated Signature Schemes , 2003, Public Key Cryptography.
[42] Matthew K. Franklin,et al. Intrusion-Resilient Public-Key Encryption , 2003, CT-RSA.
[43] Rong Hao,et al. Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005 , 2008, ProvSec.
[44] Corporate,et al. The handbook of information security , 1991 .