scientific article; zbMATH DE number 1418310

From MaRDI portal
Revision as of 07:43, 8 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4941872

zbMath0942.94026MaRDI QIDQ4941872

Mihir Bellare, Sara K. Miner

Publication date: 24 August 2000


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (50)

An intermediate secret-guessing attack on hash-based signaturesKey-insulated aggregate signatureFine-grained forward secrecy: allow-list/deny-list encryption and applicationsHow to construct secure proxy cryptosystemEfficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic CurvesTowards Forward Security Properties for PEKS and IBEOptimal resilient threshold GQ signaturesIdentity-based encryption with hierarchical key-insulation in the standard modelForward-secure revocable identity-based encryptionSymmetric Key Exchange with Full Forward Security and Robust SynchronizationNew forward-secure signature schemes with untrusted updateForward-secure identity-based signature: security notions and constructionPermissionless and asynchronous asset transferAn Efficient Strong Key-Insulated Signature Scheme and Its ApplicationForward-secure encryption with fast forwardingOn secure ratcheting with immediate decryptionForward-secure ID based digital signature scheme with forward-secure private key generatorIdentity-based non-interactive key distribution with forward securityForward-secure revocable secret handshakes from latticesIntrusion-resilient identity-based signatures: concrete scheme in the standard model and generic constructionFAS: forward secure sequential aggregate signatures for secure loggingUpdatable public key encryption in the standard modelOn the tightness of forward-secure signature reductionsNew methods and abstractions for RSA-based forward secure signaturesCost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward SecurityOne forward-secure signature scheme using bilinear maps and its applicationsSelf-updatable encryption: time constrained access control with hidden attributes and better efficiencyForward-secure identity-based encryption with direct chosen-ciphertext security in the standard modelTighter Reductions for Forward-Secure Signature SchemesLeakage-resilient group signature: definitions and constructionsFine-grained forward-secure signature schemes without random oraclesProtecting against key-exposure: strongly key-insulated encryption with optimal thresholdAttribute-based key-insulated signature and its applicationsReconfigurable Cryptography: A Flexible Approach to Long-Term SecurityIdentity-Based Threshold Key-Insulated Encryption without Random OraclesSecurity of signature schemes in the presence of key-dependent messagesKey Insulation and Intrusion Resilience over a Public ChannelRealizing Hash-and-Sign Signatures under Standard AssumptionsSearchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensionsXMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security AssumptionsLeakage-Resilient SignaturesOn the security of Miyaji et al. group signature schemeConstruction of Yet Another Forward Secure Signature Scheme Using Bilinear MapsCryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005Forward-secure multisignature and blind signature schemesAttacks on Secure Logging SchemesGroup signature schemes with forward secure propertiesSecure Key-Updating for Lazy RevocationAsynchronous reconfiguration with Byzantine failuresForward secure message franking






This page was built for publication: