Forward-secure identity-based signature: security notions and construction
From MaRDI portal
Publication:621647
DOI10.1016/j.ins.2010.09.034zbMath1204.94094OpenAlexW2021371127MaRDI QIDQ621647
Jia Yu, Rong Hao, Jianxi Fan, Fanyu Kong, Yangkui Chen, Xiangguo Cheng
Publication date: 28 January 2011
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2010.09.034
Related Items (12)
Key-insulated aggregate signature ⋮ Quantum signature scheme based on secret sharing ⋮ Forward-secure ID based digital signature scheme with forward-secure private key generator ⋮ Intrusion-resilient identity-based signatures: concrete scheme in the standard model and generic construction ⋮ Two extensions of the ring signature scheme of Rivest-Shamir-Taumann ⋮ Concurrent signature without random oracles ⋮ Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security ⋮ One forward-secure signature scheme using bilinear maps and its applications ⋮ IRIBE: intrusion-resilient identity-based encryption ⋮ Generic security-amplifying methods of ordinary digital signatures ⋮ Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts ⋮ Forward-secure identity-based signature with efficient revocation
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Certificateless threshold ring signature
- Certificateless signcryption scheme in the standard model
- A secure identity-based proxy multi-signature scheme
- Breaking the short certificateless signature scheme
- Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism
- Certificateless undeniable signature scheme
- Identity-Based Cryptosystems and Signature Schemes
- Key Insulation and Intrusion Resilience over a Public Channel
- Hierarchical ID-Based Cryptography
- An Identity-Based Signature from Gap Diffie-Hellman Groups
- Strong Key-Insulated Signature Schemes
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Identity-Based Key-Insulated Signature with Secure Key-Updates
- Efficient Intrusion-Resilient Signatures Without Random Oracles
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps
- Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps
- Information Security and Cryptology - ICISC 2003
- Efficient Identity-Based Signatures Secure in the Standard Model
This page was built for publication: Forward-secure identity-based signature: security notions and construction