A Forward-Secure Public-Key Encryption Scheme
暂无分享,去创建一个
[1] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[2] Amit Sahai,et al. Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[3] Leonid Reyzin,et al. Forward-Secure Signatures with Fast Key Update , 2002, SCN.
[4] Daniel R. Simon,et al. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack , 1991, CRYPTO.
[5] Moni Naor,et al. Nonmalleable Cryptography , 2000, SIAM Rev..
[6] Donald Beaver,et al. Cryptographic Protocols Provably Secure Against Dynamic Adversaries , 1992, EUROCRYPT.
[7] Ben Lynn,et al. Toward Hierarchical Identity-Based Encryption , 2002, EUROCRYPT.
[8] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[9] Mihir Bellare,et al. A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.
[10] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[11] Antoine Joux,et al. Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups , 2001, IACR Cryptology ePrint Archive.
[12] Antoine Joux. A One Round Protocol for Tripartite Diffie-Hellman , 2000, ANTS.
[13] Yehuda Lindell,et al. A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions , 2003, Journal of Cryptology.
[14] Donald Beaver,et al. Plug and Play Encryption , 1997, CRYPTO.
[15] Alfred V. Aho,et al. The Design and Analysis of Computer Algorithms , 1974 .
[16] Markus Jakobsson,et al. Proactive public key and signature systems , 1997, CCS '97.
[17] Moni Naor,et al. Adaptively secure multi-party computation , 1996, STOC '96.
[18] Ivan Damgård,et al. Collision Free Hash Functions and Public Key Signature Schemes , 1987, EUROCRYPT.
[19] Rafail Ostrovsky,et al. How to withstand mobile virus attacks (extended abstract) , 1991, PODC '91.
[20] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[21] Moni Naor,et al. Public-key cryptosystems provably secure against chosen ciphertext attacks , 1990, STOC '90.
[22] Gene Itkis,et al. Forward-Secure Signatures with Optimal Signing and Verifying , 2001, CRYPTO.
[23] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[24] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[25] Shouhuai Xu,et al. Strong Key-Insulated Signature Schemes , 2003, Public Key Cryptography.
[26] Jesper Buus Nielsen,et al. Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case , 2002, CRYPTO.
[27] Adi Shamir,et al. How to share a secret , 1979, CACM.
[28] Tal Malkin,et al. Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods , 2002, EUROCRYPT.
[29] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[30] Tatsuaki Okamoto,et al. Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, CRYPTO.
[31] Mihir Bellare,et al. Forward-Security in Private-Key Cryptography , 2003, CT-RSA.
[32] Christoph G. Günther. An Identity-Based Key-Exchange Protocol , 1989, EUROCRYPT.
[33] Eric R. Verheul,et al. Self-Blindable Credential Certificates from the Weil Pairing , 2001, ASIACRYPT.
[34] Leonid Reyzin,et al. A New Forward-Secure Digital Signature Scheme , 2000, ASIACRYPT.
[35] Moni Naor,et al. Non-malleable cryptography , 1991, STOC '91.
[36] Hugo Krawczyk,et al. Simple forward-secure signatures from any signature scheme , 2000, IACR Cryptol. ePrint Arch..
[37] Ross J. Anderson,et al. Two remarks on public key cryptology , 2002 .
[38] Ivan Damgård,et al. Improved Non-committing Encryption Schemes Based on a General Complexity Assumption , 2000, CRYPTO.