Publication:4941872

From MaRDI portal


zbMath0942.94026MaRDI QIDQ4941872

Mihir Bellare, Sara K. Miner

Publication date: 24 August 2000




Related Items

An intermediate secret-guessing attack on hash-based signatures, Key-insulated aggregate signature, Fine-grained forward secrecy: allow-list/deny-list encryption and applications, How to construct secure proxy cryptosystem, Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic Curves, Towards Forward Security Properties for PEKS and IBE, Optimal resilient threshold GQ signatures, Identity-based encryption with hierarchical key-insulation in the standard model, Forward-secure revocable identity-based encryption, Symmetric Key Exchange with Full Forward Security and Robust Synchronization, New forward-secure signature schemes with untrusted update, Forward-secure identity-based signature: security notions and construction, Permissionless and asynchronous asset transfer, An Efficient Strong Key-Insulated Signature Scheme and Its Application, Forward-secure encryption with fast forwarding, On secure ratcheting with immediate decryption, Forward-secure ID based digital signature scheme with forward-secure private key generator, Identity-based non-interactive key distribution with forward security, Forward-secure revocable secret handshakes from lattices, Intrusion-resilient identity-based signatures: concrete scheme in the standard model and generic construction, FAS: forward secure sequential aggregate signatures for secure logging, Updatable public key encryption in the standard model, On the tightness of forward-secure signature reductions, New methods and abstractions for RSA-based forward secure signatures, Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security, One forward-secure signature scheme using bilinear maps and its applications, Self-updatable encryption: time constrained access control with hidden attributes and better efficiency, Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model, Tighter Reductions for Forward-Secure Signature Schemes, Leakage-resilient group signature: definitions and constructions, Fine-grained forward-secure signature schemes without random oracles, Protecting against key-exposure: strongly key-insulated encryption with optimal threshold, Attribute-based key-insulated signature and its applications, Reconfigurable Cryptography: A Flexible Approach to Long-Term Security, Identity-Based Threshold Key-Insulated Encryption without Random Oracles, Security of signature schemes in the presence of key-dependent messages, Key Insulation and Intrusion Resilience over a Public Channel, Realizing Hash-and-Sign Signatures under Standard Assumptions, Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions, XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions, Leakage-Resilient Signatures, On the security of Miyaji et al. group signature scheme, Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps, Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005, Forward-secure multisignature and blind signature schemes, Attacks on Secure Logging Schemes, Group signature schemes with forward secure properties, Secure Key-Updating for Lazy Revocation, Asynchronous reconfiguration with Byzantine failures, Forward secure message franking