A Forward-Secure Certificate-Based Signature Scheme
暂无分享,去创建一个
Jianying Zhou | Xinyi Huang | Jiguo Li | Yichen Zhang | Huiyun Teng | Xinyi Huang | Jianying Zhou | Jiguo Li | Yichen Zhang | Huiyun Teng
[1] David Pointcheval,et al. Tighter Reductions for Forward-Secure Signature Schemes , 2013, Public Key Cryptography.
[2] Xinyi Huang,et al. Certificate-based signcryption with enhanced security features , 2012, Comput. Math. Appl..
[3] Moni Naor,et al. Public-Key Cryptosystems Resilient to Key Leakage , 2012, SIAM J. Comput..
[4] Lizhong Xu,et al. An efficient short certificate-based signature scheme , 2012, J. Syst. Softw..
[5] Johannes A. Buchmann,et al. XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions , 2011, IACR Cryptol. ePrint Arch..
[6] Brent Waters,et al. Practical leakage-resilient identity-based encryption from simple assumptions , 2010, CCS '10.
[7] Yi Mu,et al. Constructions of certificate-based signature secure against key replacement attacks , 2010, J. Comput. Secur..
[8] Moni Naor,et al. Public-Key Encryption in the Bounded-Retrieval Model , 2010, EUROCRYPT.
[9] Vinod Vaikuntanathan,et al. Signature Schemes with Bounded Leakage Resilience , 2009, ASIACRYPT.
[10] Yevgeniy Dodis,et al. Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model , 2009, CRYPTO.
[11] Yi Mu,et al. Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures , 2009, WISA.
[12] Kenneth G. Paterson,et al. Challenges for Trusted Computing , 2008, IEEE Security & Privacy Magazine.
[13] Stefan Dziembowski,et al. Leakage-Resilient Cryptography , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.
[14] Ahmad-Reza Sadeghi,et al. Property-Based Attestation without a Trusted Third Party , 2008, ISC.
[15] Liu Yali,et al. A new forward-secure signature scheme , 2008, 2008 27th Chinese Control Conference.
[16] Basel Alomair,et al. Efficient Generic Forward-Secure Signatures and Proxy Signatures , 2008, EuroPKI.
[17] Zhang Ya-juan,et al. An identity-based key-exchange protocol , 2008, Wuhan University Journal of Natural Sciences.
[18] Moti Yung,et al. Forward-secure signatures in untrusted update environments: efficient and generic constructions , 2007, CCS '07.
[19] Yi Mu,et al. Certificate-Based Signature: Security Model and Efficient Construction , 2007, EuroPKI.
[20] Ran Canetti,et al. A Forward-Secure Public-Key Encryption Scheme , 2003, Journal of Cryptology.
[21] Ahmad-Reza Sadeghi,et al. A protocol for property-based attestation , 2006, STC '06.
[22] Hovav Shacham,et al. Available from the IACR Cryptology ePrint Archive as Report 2006/297. Forward-Secure Signatures with Untrusted Update , 2006 .
[23] Ahmad-Reza Sadeghi,et al. Property-based attestation for computing platforms: caring about properties, not mechanisms , 2004, NSPW '04.
[24] Je Hong Park,et al. A Certificate-Based Signature Scheme , 2004, CT-RSA.
[25] Je Hong Park,et al. A New Forward Secure Signature Scheme , 2004, IACR Cryptol. ePrint Arch..
[26] Craig Gentry,et al. Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.
[27] Tal Malkin,et al. Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods , 2002, EUROCRYPT.
[28] Dawn Xiaodong Song,et al. Practical forward secure group signature schemes , 2001, CCS '01.
[29] Gene Itkis,et al. Forward-Secure Signatures with Optimal Signing and Verifying , 2001, CRYPTO.
[30] Wen-Guey Tzeng,et al. Robust Forward-Secure Signature Schemes with Proactive Security , 2001, Public Key Cryptography.
[31] Hugo Krawczyk,et al. Simple forward-secure signatures from any signature scheme , 2000, IACR Cryptol. ePrint Arch..
[32] Leonid Reyzin,et al. A New Forward-Secure Digital Signature Scheme , 2000, ASIACRYPT.
[33] Mihir Bellare,et al. A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.
[34] R. Nicoll,et al. Invited lecture , 1997, Neuroscience Research.
[35] Claus-Peter Schnorr,et al. Fast Signature Generation With a Fiat Shamir-Like Scheme , 1991, EUROCRYPT.
[36] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[37] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[38] Adi Shamir,et al. How to share a secret , 1979, CACM.