scientific article; zbMATH DE number 1418310
From MaRDI portal
Publication:4941872
zbMath0942.94026MaRDI QIDQ4941872
Publication date: 24 August 2000
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (50)
An intermediate secret-guessing attack on hash-based signatures ⋮ Key-insulated aggregate signature ⋮ Fine-grained forward secrecy: allow-list/deny-list encryption and applications ⋮ How to construct secure proxy cryptosystem ⋮ Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic Curves ⋮ Towards Forward Security Properties for PEKS and IBE ⋮ Optimal resilient threshold GQ signatures ⋮ Identity-based encryption with hierarchical key-insulation in the standard model ⋮ Forward-secure revocable identity-based encryption ⋮ Symmetric Key Exchange with Full Forward Security and Robust Synchronization ⋮ New forward-secure signature schemes with untrusted update ⋮ Forward-secure identity-based signature: security notions and construction ⋮ Permissionless and asynchronous asset transfer ⋮ An Efficient Strong Key-Insulated Signature Scheme and Its Application ⋮ Forward-secure encryption with fast forwarding ⋮ On secure ratcheting with immediate decryption ⋮ Forward-secure ID based digital signature scheme with forward-secure private key generator ⋮ Identity-based non-interactive key distribution with forward security ⋮ Forward-secure revocable secret handshakes from lattices ⋮ Intrusion-resilient identity-based signatures: concrete scheme in the standard model and generic construction ⋮ FAS: forward secure sequential aggregate signatures for secure logging ⋮ Updatable public key encryption in the standard model ⋮ On the tightness of forward-secure signature reductions ⋮ New methods and abstractions for RSA-based forward secure signatures ⋮ Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security ⋮ One forward-secure signature scheme using bilinear maps and its applications ⋮ Self-updatable encryption: time constrained access control with hidden attributes and better efficiency ⋮ Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model ⋮ Tighter Reductions for Forward-Secure Signature Schemes ⋮ Leakage-resilient group signature: definitions and constructions ⋮ Fine-grained forward-secure signature schemes without random oracles ⋮ Protecting against key-exposure: strongly key-insulated encryption with optimal threshold ⋮ Attribute-based key-insulated signature and its applications ⋮ Reconfigurable Cryptography: A Flexible Approach to Long-Term Security ⋮ Identity-Based Threshold Key-Insulated Encryption without Random Oracles ⋮ Security of signature schemes in the presence of key-dependent messages ⋮ Key Insulation and Intrusion Resilience over a Public Channel ⋮ Realizing Hash-and-Sign Signatures under Standard Assumptions ⋮ Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions ⋮ XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions ⋮ Leakage-Resilient Signatures ⋮ On the security of Miyaji et al. group signature scheme ⋮ Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps ⋮ Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005 ⋮ Forward-secure multisignature and blind signature schemes ⋮ Attacks on Secure Logging Schemes ⋮ Group signature schemes with forward secure properties ⋮ Secure Key-Updating for Lazy Revocation ⋮ Asynchronous reconfiguration with Byzantine failures ⋮ Forward secure message franking
This page was built for publication: