Strong Key-Insulated Signature Schemes
From MaRDI portal
Publication:4414703
DOI10.1007/3-540-36288-6_10zbMath1033.94555OpenAlexW1481068248MaRDI QIDQ4414703
Shouhuai Xu, Yevgeniy Dodis, Jonathan N. Katz, Mordechai M. Yung
Publication date: 27 July 2003
Published in: Public Key Cryptography — PKC 2003 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-36288-6_10
Related Items (29)
Key-insulated aggregate signature ⋮ Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic Curves ⋮ Identity-based encryption with hierarchical key-insulation in the standard model ⋮ Strong key-insulated signature in the standard model ⋮ A generic construction of tightly secure signatures in the multi-user setting ⋮ Certificateless key-insulated signature without random oracles ⋮ Forward-secure identity-based signature: security notions and construction ⋮ Identity-based key-insulated proxy signature without random oracles ⋮ Certificateless strong key-insulated signature without random oracles ⋮ An Efficient Strong Key-Insulated Signature Scheme and Its Application ⋮ Forward-secure encryption with fast forwarding ⋮ Intrusion-resilient identity-based signatures: concrete scheme in the standard model and generic construction ⋮ Tight security for the generic construction of identity-based signature (in the multi-instance setting) ⋮ An efficient threshold key-insulated signature scheme ⋮ Identity-based ring signatures from RSA ⋮ One forward-secure signature scheme using bilinear maps and its applications ⋮ Fine-grained forward-secure signature schemes without random oracles ⋮ Protecting against key-exposure: strongly key-insulated encryption with optimal threshold ⋮ Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures ⋮ Proxy Signatures Secure Against Proxy Key Exposure ⋮ Attribute-based key-insulated signature and its applications ⋮ An improved certificateless strong key-insulated signature scheme in the standard model ⋮ Identity-Based Threshold Key-Insulated Encryption without Random Oracles ⋮ Key Insulation and Intrusion Resilience over a Public Channel ⋮ Security proofs for identity-based identification and signature schemes ⋮ Leakage Resilient Strong Key-Insulated Signatures in Public Channel ⋮ Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps ⋮ Secure Key-Updating for Lazy Revocation ⋮ Short identity-based signatures with tight security from lattices
This page was built for publication: Strong Key-Insulated Signature Schemes