메뉴 건너뛰기




Volumn 4189 LNCS, Issue , 2006, Pages 327-346

Secure key-updating for lazy revocation

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL METHODS; INFORMATION MANAGEMENT; MATHEMATICAL MODELS; PROBLEM SOLVING; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 33750228447     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11863908_21     Document Type: Conference Paper
Times cited : (28)

References (33)
  • 1
    • 84937436045 scopus 로고    scopus 로고
    • Increasing the lifetime of a key: A comparitive analysis of the security of rekeying techniques
    • Proc. Asiacrypt 2000, Springer-Verlag
    • M. Abdalla and M. Bellare, "Increasing the lifetime of a key: A comparitive analysis of the security of rekeying techniques," in Proc. Asiacrypt 2000, vol. 1976 of Lecture Notes in Computer Science, pp. 546-559, Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1976 , pp. 546-559
    • Abdalla, M.1    Bellare, M.2
  • 2
    • 84937427768 scopus 로고    scopus 로고
    • A new forward-secure digital signature scheme
    • Proc. Asiacrypt 2000, Springer-Verlag
    • M. Abdalla and L. Reyzin, "A new forward-secure digital signature scheme," in Proc. Asiacrypt 2000, vol. 1976 of Lecture Notes in Computer Science, pp. 116-129, Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1976 , pp. 116-129
    • Abdalla, M.1    Reyzin, L.2
  • 4
    • 24144439329 scopus 로고    scopus 로고
    • Two remarks on public-key cryptology
    • University of Cambridge
    • R. Anderson, "Two remarks on public-key cryptology," Technical Report UCAM-CL-TR-549, University of Cambridge, 2002.
    • (2002) Technical Report , vol.UCAM-CL-TR-549
    • Anderson, R.1
  • 6
    • 33750253019 scopus 로고    scopus 로고
    • Secure key-updating for lazy revocation
    • IBM Research, Aug.
    • M. Backes, C. Cachin, and A. Oprea, "Secure key-updating for lazy revocation," Research Report RZ 3627, IBM Research, Aug. 2005.
    • (2005) Research Report , vol.RZ 3627
    • Backes, M.1    Cachin, C.2    Oprea, A.3
  • 8
    • 79958074367 scopus 로고    scopus 로고
    • A forward-secure digital signature scheme
    • Proc. Crypto 1999, Springer-Verlag
    • M. Bellare and S. Miner, "A forward-secure digital signature scheme," in Proc. Crypto 1999, vol. 1666 of Lecture Notes in Computer Science, pp. 431-448, Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 431-448
    • Bellare, M.1    Miner, S.2
  • 9
    • 35248891000 scopus 로고    scopus 로고
    • Forward-security in private-key cryptography
    • Proc. CT-RSA 2003, Springer-Verlag
    • M. Bellare and B. Yee, "Forward-security in private-key cryptography," in Proc. CT-RSA 2003, vol. 2612 of Lecture Notes in Computer Science, pp. 1-18, Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2612 , pp. 1-18
    • Bellare, M.1    Yee, B.2
  • 11
    • 35248897599 scopus 로고    scopus 로고
    • A forward-secure public-key encryption scheme
    • Proc. Eurocrypt 2003, Springer-Verlag
    • R. Canetti, S. Halevi, and J. Katz, "A forward-secure public-key encryption scheme," in Proc. Eurocrypt 2003, vol. 2656 of Lecture Notes in Computer Science, pp. 255-271, Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2656 , pp. 255-271
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 13
    • 35248884707 scopus 로고    scopus 로고
    • Intrusion-resilient public-key encryption
    • Proc. CT-RSA 2003, Springer-Verlag
    • Y. Dodis, M. Franklin, J. Katz, A. Miyaji, and M. Yung, "Intrusion-resilient public-key encryption," in Proc. CT-RSA 2003, vol. 2612 of Lecture Notes in Computer Science, pp. 19-32, Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2612 , pp. 19-32
    • Dodis, Y.1    Franklin, M.2    Katz, J.3    Miyaji, A.4    Yung, M.5
  • 14
    • 84947254092 scopus 로고    scopus 로고
    • Key insulated public-key cryptosystems
    • Proc. Eurocrypt 2002, Springer-Verlag
    • Y. Dodis, J. Katz, S. Xu, and M. Yung, "Key insulated public-key cryptosystems," in Proc. Eurocrypt 2002, vol. 2332 of Lecture Notes in Computer Science, pp. 65-82, Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 65-82
    • Dodis, Y.1    Katz, J.2    Xu, S.3    Yung, M.4
  • 15
    • 35248813300 scopus 로고    scopus 로고
    • Strong key-insulated signature schemes
    • Proc. Workshop of Public Key Cryptography (PKC), Springer-Verlag
    • Y. Dodis, J. Katz, and M. Yung, "Strong key-insulated signature schemes," in Proc. Workshop of Public Key Cryptography (PKC), vol. 2567 of Lecture Notes in Computer Science, pp. 130-144, Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2567 , pp. 130-144
    • Dodis, Y.1    Katz, J.2    Yung, M.3
  • 19
    • 24944584332 scopus 로고    scopus 로고
    • Efficient tree-based revocation in groups of low-state devices
    • Proc. Crypto 2004, Springer-Verlag
    • M. T. Goodrich, J. Z. Sun, and R. Tamassia, "Efficient tree-based revocation in groups of low-state devices," in Proc. Crypto 2004, vol. 3152 of Lecture Notes in Computer Science, pp. 511-522, Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3152 , pp. 511-522
    • Goodrich, M.T.1    Sun, J.Z.2    Tamassia, R.3
  • 22
    • 84880879872 scopus 로고    scopus 로고
    • Forward-secure signatures with optimal signing and verifying
    • Proc. Crypto 2001, Springer-Verlag
    • G. Itkis and L. Reyzin, "Forward-secure signatures with optimal signing and verifying," in Proc. Crypto 2001, vol. 2139 of Lecture Notes in Computer Science, pp. 332-354, Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 332-354
    • Itkis, G.1    Reyzin, L.2
  • 23
    • 84937422774 scopus 로고    scopus 로고
    • SiBIR: Signer-base intrusion-resilient signatures
    • Proc. Crypto 2002, Springer-Verlag
    • G. Itkis and L. Reyzin, "SiBIR: Signer-base intrusion-resilient signatures," in Proc. Crypto 2002, vol. 2442 of Lecture Notes in Computer Science, pp. 499-514, Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 499-514
    • Itkis, G.1    Reyzin, L.2
  • 27
    • 84947234528 scopus 로고    scopus 로고
    • Efficient generic forward-secure signatures with an unbounded number of time periods
    • Proc. Eurocrypt 2002, Springer-Verlag
    • T. Malkin, D. Micciancio, and S. Miner, "Efficient generic forward-secure signatures with an unbounded number of time periods," in Proc. Eurocrypt 2002, vol. 2332 of Lecture Notes in Computer Science, pp. 400-417, Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 400-417
    • Malkin, T.1    Micciancio, D.2    Miner, S.3
  • 28
    • 35048851224 scopus 로고    scopus 로고
    • The hierarchy of key evolving signatures and a characterization of proxy signatures
    • Proc. Eurocrypt 2004, Springer-Verlag
    • T. Malkin, S. Obana, and M. Yung, "The hierarchy of key evolving signatures and a characterization of proxy signatures," in Proc. Eurocrypt 2004, vol. 3027 of Lecture Notes in Computer Science, pp. 306-322, Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 306-322
    • Malkin, T.1    Obana, S.2    Yung, M.3
  • 31
    • 0038043478 scopus 로고    scopus 로고
    • Key establishment in large dynamic groups using one-way function trees
    • A. T. Sherman and D. A. McGrew, "Key establishment in large dynamic groups using one-way function trees," IEEE Transactions on Software Engineering, vol. 29, no. 5, pp. 444-458, 2003.
    • (2003) IEEE Transactions on Software Engineering , vol.29 , Issue.5 , pp. 444-458
    • Sherman, A.T.1    McGrew, D.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.