메뉴 건너뛰기




Volumn , Issue , 2003, Pages 45-52

Exposure-resilience for free: The hierarchical ID-based encryption case

Author keywords

bilinear Diffie Hellman; cryptographic key storage; exposure resilience; gradual key exposure; hierarchical id based encryption; key redundancy; key storage protection

Indexed keywords

ACCESS CONTROL; NETWORK SECURITY; PHILOSOPHICAL ASPECTS; REAL TIME SYSTEMS;

EID: 84962765327     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SISW.2002.1183509     Document Type: Conference Paper
Times cited : (21)

References (29)
  • 1
    • 84956967868 scopus 로고    scopus 로고
    • A New Forward-Secure Digital Signature Scheme
    • M. Abdalla and L. Reyzin. A New Forward-Secure Digital Signature Scheme. Asiacrypt 2000.
    • Asiacrypt 2000
    • Abdalla, M.1    Reyzin, L.2
  • 2
    • 33845949171 scopus 로고    scopus 로고
    • Two Remarks on Public-Key Cryptology
    • Invited lecture
    • R. Anderson. Two Remarks on Public-Key Cryptology. Invited lecture, CCCS 1997. URL: http://www.cl.cam.ac.uk/users/rja14/.
    • CCCS 1997
    • Anderson, R.1
  • 3
    • 0001229355 scopus 로고    scopus 로고
    • A Forward-Secure Digital Signature Scheme
    • M. Bellare and S. Miner. A Forward-Secure Digital Signature Scheme. Crypto 1999.
    • Crypto 1999
    • Bellare, M.1    Miner, S.2
  • 6
    • 0012970453 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Crypto 2001
    • D. Boneh and M. Franklin. Identity-Based Encryption from the Weil Pairing. Crypto 2001. Full version to appear in SIAM J. Computing and available at http://eprint.iacr.org/2001/090/.
    • SIAM J. Computing
    • Boneh, D.1    Franklin, M.2
  • 14
    • 84962734623 scopus 로고    scopus 로고
    • On Perfect and Adaptive Security in Exposure-Resilient Cryptography
    • Y. Dodis, A. Sahai and A. Smith. On Perfect and Adaptive Security in Exposure-Resilient Cryptography. EuroCrypt 2001.
    • EuroCrypt 2001
    • Dodis, Y.1    Sahai, A.2    Smith, A.3
  • 15
    • 0000561923 scopus 로고    scopus 로고
    • Secure Integration of Asymmetric and Symmetric Encryption Schemes
    • E. Fujisaki and T. Okamoto. Secure Integration of Asymmetric and Symmetric Encryption Schemes. Crypto 1999.
    • Crypto 1999
    • Fujisaki, E.1    Okamoto, T.2
  • 18
    • 14844282616 scopus 로고    scopus 로고
    • Toward Hierarchical Identity-Based Encryption
    • J. Horwitz and B. Lynn. Toward Hierarchical Identity-Based Encryption. Eurocrypt 2002.
    • Eurocrypt 2002
    • Horwitz, J.1    Lynn, B.2
  • 19
    • 70549087421 scopus 로고    scopus 로고
    • Intrusion-Resilient Signatures: Generic Constructions, or Defeating a Strong Adversary with Minimal Assumptions
    • G. Itkis. Intrusion-Resilient Signatures: Generic Constructions, or Defeating a Strong Adversary with Minimal Assumptions. SCN 2002.
    • SCN 2002
    • Itkis, G.1
  • 20
    • 0037885445 scopus 로고    scopus 로고
    • Forward-Secure Signatures with Optimal Signing and Verifying
    • G. Itkis and L. Reyzin. Forward-Secure Signatures with Optimal Signing and Verifying. Crypto 2001.
    • Crypto 2001
    • Itkis, G.1    Reyzin, L.2
  • 21
    • 84871980827 scopus 로고    scopus 로고
    • SiBIR: Signer-Base Intrusion-Resilient Signatures
    • G. Itkis and L. Reyzin. SiBIR: Signer-Base Intrusion-Resilient Signatures. Crypto 2002.
    • Crypto 2002
    • Itkis, G.1    Reyzin, L.2
  • 22
    • 0038425885 scopus 로고    scopus 로고
    • The Weil and Tate Pairing as Building Blocks for Public-Key Cryptosystems
    • A. Joux. The Weil and Tate Pairing as Building Blocks for Public-Key Cryptosystems. ANTS 2002.
    • ANTS 2002
    • Joux, A.1
  • 24
    • 0034450093 scopus 로고    scopus 로고
    • Simple Forward-Secure Signatures From any Signature Scheme
    • H. Krawczyk. Simple Forward-Secure Signatures From any Signature Scheme. CCCS 2000.
    • CCCS 2000
    • Krawczyk, H.1
  • 26
    • 84956984016 scopus 로고    scopus 로고
    • Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periods
    • T. Malkin, D. Micciancio, and S. Miner. Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periods. Eurocrypt 2002.
    • Eurocrypt 2002
    • Malkin, T.1    Micciancio, D.2    Miner, S.3
  • 27
    • 85027164480 scopus 로고    scopus 로고
    • How to Withstand Mobile Virus Attacks
    • R. Ostrovsky and M. Yung. How to Withstand Mobile Virus Attacks. PODC 1991.
    • PODC 1991
    • Ostrovsky, R.1    Yung, M.2
  • 28
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. In Communic. of the ACM, 22:612-613, 1979.
    • (1979) Communic. of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 29
    • 0001827537 scopus 로고    scopus 로고
    • Identity-Based Cryptosystems and Signature Schemes
    • A. Shamir. Identity-Based Cryptosystems and Signature Schemes. Crypto 1984.
    • Crypto 1984
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.