메뉴 건너뛰기




Volumn 2898, Issue , 2003, Pages 167-182

Efficient key updating signature schemes based on IBS

Author keywords

Identity based signature; Intrusion resilient siganture; Key insulated signature

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 33749423236     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-40974-8_14     Document Type: Article
Times cited : (16)

References (20)
  • 1
    • 84874324906 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing
    • Crypto 2001
    • D. Boneh and M. Franklin, "Identity based encryption from the Weil pairing," Crypto 2001, LNCS Vol. 2139, pp. 213-229, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 2
    • 79958074367 scopus 로고    scopus 로고
    • A forward-secure digital signature scheme
    • Crypto 1999
    • M. Bellare and S. Miner, "A forward-secure digital signature scheme," Crypto 1999, LNCS Vol. 1666, pp. 431-448, 1999.
    • (1999) LNCS , vol.1666 , pp. 431-448
    • Bellare, M.1    Miner, S.2
  • 3
    • 35248832513 scopus 로고    scopus 로고
    • Protecting against key exposure: Strong key-insulated encryption with optimal threshold
    • M. Bellare and A. Palacio, "Protecting against key exposure: strong key-insulated encryption with optimal threshold," Cryptology ePrint archive 2002/064, http://eprint.iacr.org/, 2002.
    • (2002) Cryptology ePrint Archive 2002/064
    • Bellare, M.1    Palacio, A.2
  • 4
    • 35248844436 scopus 로고    scopus 로고
    • An identity-based signature from gap Diffie-Hellman groups
    • PKC 2003
    • J. C. Cha and J. H. Cheon, "An identity-based signature from gap Diffie-Hellman groups," PKC 2003, LNCS Vol. 2567, pp. 18-30, 2003.
    • (2003) LNCS , vol.2567 , pp. 18-30
    • Cha, J.C.1    Cheon, J.H.2
  • 5
    • 35248897599 scopus 로고    scopus 로고
    • A forward-secure public-key encryption scheme
    • Eurocrypt 2003
    • R. Canetti, S. Halevi and J. Katz, "A forward-secure public-key encryption scheme," Eurocrypt 2003, LNCS Vol. 2656, pp. 256-271, 2003.
    • (2003) LNCS , vol.2656 , pp. 256-271
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 6
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • Crypto 1989
    • Y. Desmedt and Y. Frankel, "Threshold cryptosystems," Crypto 1989, LNCS Vol. 435, pp. 307-315, 1989.
    • (1989) LNCS , vol.435 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 7
    • 35248884707 scopus 로고    scopus 로고
    • Intrusion-resilient public-key encryption
    • CT-RSA 2003
    • Y. Dolis, M. Franklin, J. Katz, A. Miyaji, and M. Yung, "Intrusion-resilient public-key encryption," CT-RSA 2003, LNCS Vol. 2612, pp. 19-32, 2003.
    • (2003) LNCS , vol.2612 , pp. 19-32
    • Dolis, Y.1    Franklin, M.2    Katz, J.3    Miyaji, A.4    Yung, M.5
  • 8
    • 84947254092 scopus 로고    scopus 로고
    • Key-insulated public key cryptosystems
    • Eurocrypt 2002
    • Y. Dolis, J. Katz, S. Xu and M. Yung, "Key-insulated public key cryptosystems," Eurocrypt 2002, LNCS Vol. 2332, pp. 65-82, 2002.
    • (2002) LNCS , vol.2332 , pp. 65-82
    • Dolis, Y.1    Katz, J.2    Xu, S.3    Yung, M.4
  • 9
    • 35248813300 scopus 로고    scopus 로고
    • Strong key-insulated signature schemes
    • PKC 2003
    • Y. Dolis, J. Katz, S. Xu and M. Yung, "Strong key-insulated signature schemes," PKC 2003, LNCS Vol.2567, pp.130-144, 2003.
    • (2003) LNCS , vol.2567 , pp. 130-144
    • Dolis, Y.1    Katz, J.2    Xu, S.3    Yung, M.4
  • 10
    • 35248867510 scopus 로고    scopus 로고
    • Efficient Identity Based Signature Schemes Based on Pairings
    • SAC 2002
    • F. Hess, "Efficient Identity Based Signature Schemes Based on Pairings," SAC 2002, LNCS Vol. 2595, pp. 310-324, 2003.
    • (2003) LNCS , vol.2595 , pp. 310-324
    • Hess, F.1
  • 11
    • 84937422774 scopus 로고    scopus 로고
    • SiBIR: Siner-base intrusion-resilient signatures
    • Crypto 2002
    • G. Itkis and L. Reyzin, "SiBIR: Siner-base intrusion-resilient signatures," Crypto 2002, LNCS Vol. 2442, pp. 499-514, 2002.
    • (2002) LNCS , vol.2442 , pp. 499-514
    • Itkis, G.1    Reyzin, L.2
  • 12
    • 33747838524 scopus 로고    scopus 로고
    • Intrusion-resilient signatures: Generic constructions, or defeating strong adversary with minimal assumptions
    • SCN 2002
    • G. Itkis, "Intrusion-resilient signatures: generic constructions, or defeating strong adversary with minimal assumptions," SCN 2002, LNCS Vol. 2576, pp.102-118, 2003.
    • (2003) LNCS , vol.2576 , pp. 102-118
    • Itkis, G.1
  • 13
    • 3042553102 scopus 로고
    • Non-interactive public-key cryptography
    • Crypto 1991
    • U. Maurer and Y. Yacobi, "Non-interactive public-key cryptography," Crypto 1991, LNCS Vol. 547, pp. 498-507, 1991.
    • (1991) LNCS , vol.547 , pp. 498-507
    • Maurer, U.1    Yacobi, Y.2
  • 14
    • 85027164480 scopus 로고
    • How to withstand mobile virus attacks
    • R. Ostrovsky and M. Yung, "How to withstand mobile virus attacks," PODC 1991, pp 51-59, 1991.
    • (1991) PODC 1991 , pp. 51-59
    • Ostrovsky, R.1    Yung, M.2
  • 15
    • 0037194815 scopus 로고    scopus 로고
    • ID-based signatures from pairings on elliptic curves
    • K. G. Paterson, "ID-based signatures from pairings on elliptic curves," Electronics Letters Vol. 38 (18), pp. 1025-1026, 2002.
    • (2002) Electronics Letters , vol.38 , Issue.18 , pp. 1025-1026
    • Paterson, K.G.1
  • 16
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • Crypto 1991
    • T. Pedersen, "Non-interactive and information-theoretic secure verifiable secret sharing," Crypto 1991, LNCS Vol. 576, pp. 129-140, 1991.
    • (1991) LNCS , vol.576 , pp. 129-140
    • Pedersen, T.1
  • 17
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Comm. ACM, 22(11), pp. 612-613, 1979.
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 18
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Crypto 1994
    • A. Shamir, "Identity-based cryptosystems and signature schemes," Crypto 1994, LNCS Vol. 196, pp. 47-53, 1984.
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 19
    • 85032215902 scopus 로고
    • A realization scheme for the identity-based cryptosystem
    • Crypto 1987
    • H. Tanaka, "A realization scheme for the identity-based cryptosystem," Crypto 1987, LNCS Vol. 293, pp. 341-349, 1987.
    • (1987) LNCS , vol.293 , pp. 341-349
    • Tanaka, H.1
  • 20
    • 0024664858 scopus 로고
    • An ID-based cryptosystem based on the discrete logarithm problem
    • S. Tsuji and T. Itoh, "An ID-based cryptosystem based on the discrete logarithm problem," IEEE Journal on Selected Areas in Communication, Vol. 7, pp. 467-473, 1989.
    • (1989) IEEE Journal on Selected Areas in Communication , vol.7 , pp. 467-473
    • Tsuji, S.1    Itoh, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.