Black-box constructions of signature schemes in the bounded leakage setting
From MaRDI portal
Publication:781055
DOI10.1016/j.ins.2017.09.055zbMath1436.94105OpenAlexW2760376477MaRDI QIDQ781055
Publication date: 16 July 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2017.09.055
identity-based signaturecertificateless signatureblack-box constructionbounded leakage modelleakage-resilient cryptography
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Signature schemes secure against hard-to-invert leakage
- Efficient certificateless proxy signature scheme with provable security
- Certificateless threshold signature scheme from bilinear maps
- Certificateless threshold ring signature
- Security proofs for identity-based identification and signature schemes
- Certificateless signature: a new security model and an improved generic construction
- Fully leakage-resilient signatures
- Certificateless undeniable signature scheme
- Fully Leakage-Resilient Signatures with Auxiliary Inputs
- Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency
- A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model
- Identity-Based Cryptosystems and Signature Schemes
- Achieving Leakage Resilience through Dual System Encryption
- Signatures Resilient to Continual Leakage on Memory and Computation
- Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- A Practical Leakage-Resilient Signature Scheme in the Generic Group Model
- Certificateless Signature Revisited
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Generic Transformation to Strongly Unforgeable Signatures
- Signature Schemes with Bounded Leakage Resilience
- Hierarchical ID-Based Cryptography
- An Identity-Based Signature from Gap Diffie-Hellman Groups
- Identity-Based Encryption from the Weil Pairing
- Public Key Cryptography - PKC 2006
- Applied Cryptography and Network Security
- Theory of Cryptography
- Advances in Cryptology - ASIACRYPT 2003
This page was built for publication: Black-box constructions of signature schemes in the bounded leakage setting