Strong Key-Insulated Signature Schemes

From MaRDI portal
Publication:4414703

DOI10.1007/3-540-36288-6_10zbMath1033.94555OpenAlexW1481068248MaRDI QIDQ4414703

Shouhuai Xu, Yevgeniy Dodis, Jonathan N. Katz, Mordechai M. Yung

Publication date: 27 July 2003

Published in: Public Key Cryptography — PKC 2003 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-36288-6_10




Related Items (29)

Key-insulated aggregate signatureEfficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic CurvesIdentity-based encryption with hierarchical key-insulation in the standard modelStrong key-insulated signature in the standard modelA generic construction of tightly secure signatures in the multi-user settingCertificateless key-insulated signature without random oraclesForward-secure identity-based signature: security notions and constructionIdentity-based key-insulated proxy signature without random oraclesCertificateless strong key-insulated signature without random oraclesAn Efficient Strong Key-Insulated Signature Scheme and Its ApplicationForward-secure encryption with fast forwardingIntrusion-resilient identity-based signatures: concrete scheme in the standard model and generic constructionTight security for the generic construction of identity-based signature (in the multi-instance setting)An efficient threshold key-insulated signature schemeIdentity-based ring signatures from RSAOne forward-secure signature scheme using bilinear maps and its applicationsFine-grained forward-secure signature schemes without random oraclesProtecting against key-exposure: strongly key-insulated encryption with optimal thresholdConstruction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard SignaturesProxy Signatures Secure Against Proxy Key ExposureAttribute-based key-insulated signature and its applicationsAn improved certificateless strong key-insulated signature scheme in the standard modelIdentity-Based Threshold Key-Insulated Encryption without Random OraclesKey Insulation and Intrusion Resilience over a Public ChannelSecurity proofs for identity-based identification and signature schemesLeakage Resilient Strong Key-Insulated Signatures in Public ChannelConstruction of Yet Another Forward Secure Signature Scheme Using Bilinear MapsSecure Key-Updating for Lazy RevocationShort identity-based signatures with tight security from lattices




This page was built for publication: Strong Key-Insulated Signature Schemes