A survey of key evolving cryptosystems
暂无分享,去创建一个
[1] Shouhuai Xu,et al. Strong Key-Insulated Signature Schemes , 2003, Public Key Cryptography.
[2] David Naccache,et al. Monotone Signatures , 2001, Financial Cryptography.
[3] Jonathan Katz,et al. A Forward-Secure Public-Key Encryption Scheme , 2003, Journal of Cryptology.
[4] Mihir Bellare,et al. A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.
[5] Matthew K. Franklin,et al. Intrusion-Resilient Public-Key Encryption , 2003, CT-RSA.
[6] Tal Malkin,et al. Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods , 2002, EUROCRYPT.
[7] Gene Itkis,et al. Forward Security Adaptive Cryptography : Time Evolution Gene Itkis ? , 2004 .
[8] Peng Xie,et al. Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary , 2003, ACNS.
[9] Leonid Reyzin,et al. Forward-Secure Signatures with Fast Key Update , 2002, SCN.
[10] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[11] Shouhuai Xu,et al. Key-Insulated Public Key Cryptosystems , 2002, EUROCRYPT.
[12] Tal Malkin,et al. On the performance, feasibility, and use of forward-secure signatures , 2003, CCS '03.
[13] Rafail Ostrovsky,et al. How to withstand mobile virus attacks (extended abstract) , 1991, PODC '91.
[14] Gene Itkis,et al. Forward-Secure Signatures with Optimal Signing and Verifying , 2001, CRYPTO.
[15] Gene Itkis,et al. SiBIR: Signer-Base Intrusion-Resilient Signatures , 2002, CRYPTO.
[16] Leonid Reyzin,et al. Intrusion-Resilient Signatures, or Towards Obsoletion of Certificate Revocation , 2002, CRYPTO 2002.
[17] Markus Jakobsson,et al. Proactive public key and signature systems , 1997, CCS '97.
[18] Satoshi Obana,et al. The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures , 2004, EUROCRYPT.
[19] Leonid Reyzin,et al. A New Forward-Secure Digital Signature Scheme , 2000, ASIACRYPT.
[20] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[21] Hugo Krawczyk,et al. Simple forward-secure signatures from any signature scheme , 2000, IACR Cryptol. ePrint Arch..
[22] Gene Itkis,et al. Cryptographic tamper evidence , 2003, CCS '03.
[23] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[24] Gene Itkis,et al. Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions , 2002, SCN.
[25] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.