-
2
-
-
79958074367
-
A forward-secure digital signature scheme
-
M. Bellare and S. Miner, "A forward-secure digital signature scheme," in Proceedings of Crypto, 1999, pp. 431-448.
-
(1999)
Proceedings of Crypto
, pp. 431-448
-
-
Bellare, M.1
Miner, S.2
-
4
-
-
0037885445
-
Forward-secure signatures with optimal signing and verifying
-
G. Itkis and L. Reyzin, "Forward-secure signatures with optimal signing and verifying," in Proceedings of Crypto, 2001, pp. 499-514.
-
(2001)
Proceedings of Crypto
, pp. 499-514
-
-
Itkis, G.1
Reyzin, L.2
-
5
-
-
0345270373
-
A paradoxical" identity-based signature scheme resulting from zero-knowledge
-
L. Guillou and J. J. Quisquater, "A paradoxical" identity-based signature scheme resulting from zero-knowledge," in Proceedings of Crypto, 1988, pp. 216-231.
-
(1988)
Proceedings of Crypto
, pp. 216-231
-
-
Guillou, L.1
Quisquater, J.J.2
-
7
-
-
57049184685
-
Construction of yet another forward secure signature scheme using bilinear maps
-
J. Yu, F. Y. Kong, C. X. Guo, R. Hao, and G. W. Li, "Construction of yet another forward secure signature scheme using bilinear maps," in Proceedings of the 2nd International Conference on Provable Security, 2008, pp. 83-97.
-
(2008)
Proceedings of the 2nd International Conference on Provable Security
, pp. 83-97
-
-
Yu, J.1
Kong, F.Y.2
Guo, C.X.3
Hao, R.4
Li, G.W.5
-
9
-
-
84947234528
-
Efficient generic forward-secure signatures with an unbounded number of time periods
-
T. Malkin, D. Micciancio, and S. Miner, "Efficient generic forward-secure signatures with an unbounded number of time periods," in Proceedings of Cryptology Eurocrypt, 2002, pp. 400-417.
-
(2002)
Proceedings of Cryptology Eurocrypt
, pp. 400-417
-
-
Malkin, T.1
Micciancio, D.2
Miner, S.3
-
12
-
-
78449305489
-
Forward-secure identity-based signature: Security notions and construction
-
J. Yu, R. Hao, F. Y. Kong, X. G. Cheng, J. X. Fan, and Y. K. Chen, "Forward-secure identity-based signature: Security notions and construction," Information Sciences, Vol. 181, 2011, pp. 648-660.
-
(2011)
Information Sciences
, vol.181
, pp. 648-660
-
-
Yu, J.1
Hao, R.2
Kong, F.Y.3
Cheng, X.G.4
Fan, J.X.5
Chen, Y.K.6
-
13
-
-
35248813300
-
Strong key-insulated signature scheme
-
Y. Dodis, J. Katz, S. Xu, and M. Yung, "Strong key-insulated signature scheme," in Proceedings of the Public-Key Cryptography, 2003, pp. 130-144.
-
(2003)
Proceedings of the Public-Key Cryptography
, pp. 130-144
-
-
Dodis, Y.1
Katz, J.2
Xu, S.3
Yung, M.4
-
14
-
-
48849110619
-
Identity-based parallel key-insulated signature without random oracles
-
J. Weng, X. X. Li, K. F. Chen, and S. L. Liu, "Identity-based parallel key-insulated signature without random oracles," Journal of Information Science and Engineering, Vol. 24, 2008, pp. 1143-1157.
-
(2008)
Journal of Information Science and Engineering
, vol.24
, pp. 1143-1157
-
-
Weng, J.1
Li, X.X.2
Chen, K.F.3
Liu, S.L.4
-
15
-
-
84937422774
-
SiBIR: Signer-base intrusion-resilient signatures
-
G. Itkis and L. Reyzin, "SiBIR: Signer-base intrusion-resilient signatures," in Proceedings of Cryptology - Crypto, 2002, pp. 499-514.
-
(2002)
Proceedings of Cryptology - Crypto
, pp. 499-514
-
-
Itkis, G.1
Reyzin, L.2
-
16
-
-
54149090647
-
A generic construction for intrusionresilient signatures from linear feedback shift register
-
Z. Gong, X. X. Li, D. Zheng, and K. F. Chen, "A generic construction for intrusionresilient signatures from linear feedback shift register," Journal of Information Science and Engineering, Vol. 24, 2008, pp. 1347-1360.
-
(2008)
Journal of Information Science and Engineering
, vol.24
, pp. 1347-1360
-
-
Gong, Z.1
Li, X.X.2
Zheng, D.3
Chen, K.F.4
-
17
-
-
34547350877
-
Forward-secure signatures with untrusted update
-
X. Boyen, H. Shacham, E. Shen, and B. Waters, "Forward-secure signatures with untrusted update," in Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006, pp. 191-200.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 191-200
-
-
Boyen, X.1
Shacham, H.2
Shen, E.3
Waters, B.4
-
18
-
-
72749091644
-
Forward-secure signatures in untrusted update environments: Efficient and generic constructions
-
B. Libert, J. Quisquater, and M. Yung, "Forward-secure signatures in untrusted update environments: efficient and generic constructions," in Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007, pp. 266-275.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 266-275
-
-
Libert, B.1
Quisquater, J.2
Yung, M.3
-
19
-
-
35248897599
-
A forward-secure public-key encryption scheme
-
R. Canetti, S. Halevi, and J. Katz, "A forward-secure public-key encryption scheme," in Proceedings of Cryptology - Eurocrypt, 2003, pp. 255-271.
-
(2003)
Proceedings of Cryptology - Eurocrypt
, pp. 255-271
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
|