메뉴 건너뛰기




Volumn 9, Issue 17, 2016, Pages 3987-4001

Leakage-resilient ID-based signature scheme in the generic bilinear group model

Author keywords

continual leakage model; existential unforgeability; generic bilinear group model; leakage resilient; side channel attack

Indexed keywords

ACCESS CONTROL; COPYRIGHTS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS;

EID: 84994682630     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.1580     Document Type: Article
Times cited : (21)

References (37)
  • 2
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • Springer-Verlag, Konstanz, Germany
    • Boneh D, Demillo RA, Lipton RJ. On the importance of checking cryptographic protocols for faults, Proceedings of the EUROCRYPT'97, LNCS 1233, Springer-Verlag, Konstanz, Germany, 1997; 37–51.
    • (1997) Proceedings of the EUROCRYPT'97, LNCS 1233 , pp. 37-51
    • Boneh, D.1    Demillo, R.A.2    Lipton, R.J.3
  • 4
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Springer-Verlag, Santa Barbara
    • Kocher PC. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, Proceedings of the CRYPTO'96, LNCS 1163, Springer-Verlag, Santa Barbara, 1996; 104–113.
    • (1996) Proceedings of the CRYPTO'96, LNCS 1163 , pp. 104-113
    • Kocher, P.C.1
  • 5
    • 18844454571 scopus 로고    scopus 로고
    • Remote timing attacks are practical
    • Brumley D, Boneh D. Remote timing attacks are practical. Computer Networks. 2005; 48(5): 701–716.
    • (2005) Computer Networks , vol.48 , Issue.5 , pp. 701-716
    • Brumley, D.1    Boneh, D.2
  • 7
    • 70350303869 scopus 로고    scopus 로고
    • Public-key cryptosystems resilient to key leakage
    • Springer-Verlag, Santa Barbara
    • Naor M, Segev G. Public-key cryptosystems resilient to key leakage, Proceedings of the CRYPTO'09, LNCS 5677, Springer-Verlag, Santa Barbara, 2009; 18–35.
    • (2009) Proceedings of the CRYPTO'09, LNCS 5677 , pp. 18-35
    • Naor, M.1    Segev, G.2
  • 13
    • 84859970436 scopus 로고    scopus 로고
    • Identity-based encryption resilient to continual auxiliary leakage
    • Springer-Verlag, Cambridge, UK
    • Yuen TH, Chow SSM, Zhang Y, Yiu SM. Identity-based encryption resilient to continual auxiliary leakage, Proceedings of the EUROCRYPT'12, LNCS 7237, Springer-Verlag, Cambridge, UK, 2012; 117–134.
    • (2012) Proceedings of the EUROCRYPT'12, LNCS 7237 , pp. 117-134
    • Yuen, T.H.1    Chow, S.S.M.2    Zhang, Y.3    Yiu, S.M.4
  • 14
    • 72449205531 scopus 로고    scopus 로고
    • Signature schemes with bounded leakage resilience
    • Springer-Verlag, Tokyo, Japan
    • Katz J, Vaikuntanathan V. Signature schemes with bounded leakage resilience, Proceedings of the ASIACRYPT'09, LNCS 5912, Springer-Verlag, Tokyo, Japan, 2009; 703–720.
    • (2009) Proceedings of the ASIACRYPT'09, LNCS 5912 , pp. 703-720
    • Katz, J.1    Vaikuntanathan, V.2
  • 16
    • 70350340328 scopus 로고    scopus 로고
    • Leakage-resilient public-key cryptography in the bounded-retrieval model
    • Springer-Verlag, Santa Barbara
    • Alwen J, Dodis Y, Wichs D. Leakage-resilient public-key cryptography in the bounded-retrieval model, Proceedings of the CRYPTO'09, LNCS 5677, Springer-Verlag, Santa Barbara, 2009; 36–54.
    • (2009) Proceedings of the CRYPTO'09, LNCS 5677 , pp. 36-54
    • Alwen, J.1    Dodis, Y.2    Wichs, D.3
  • 19
    • 79953188689 scopus 로고    scopus 로고
    • Signatures resilient to continual leakage on memory and computation
    • Springer-Verlag, Providence, Rhode Island
    • Malkin T, Teranishi I, Vahlis Y, Yung M. Signatures resilient to continual leakage on memory and computation, Proceedings of the TCC'11, LNCS 6597, Springer-Verlag, Providence, Rhode Island, 2011; 89–106.
    • (2011) Proceedings of the TCC'11, LNCS 6597 , pp. 89-106
    • Malkin, T.1    Teranishi, I.2    Vahlis, Y.3    Yung, M.4
  • 20
    • 84872519992 scopus 로고    scopus 로고
    • A practical leakage-resilient Signature scheme in the generic group model
    • Springer-Verlag, Burnaby, Canada
    • Galindo D, Virek S. A practical leakage-resilient Signature scheme in the generic group model, Proceedings of the Selected Areas in Cryptography, LNCS 7707, Springer-Verlag, Burnaby, Canada, 2013; 50–65.
    • (2013) Proceedings of the Selected Areas in Cryptography, LNCS 7707 , pp. 50-65
    • Galindo, D.1    Virek, S.2
  • 24
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity-based encryption with constant size ciphertext
    • Springer-Verlag, Aarhus, Denmark
    • Boneh D, Boyen X, Goh EJ. Hierarchical identity-based encryption with constant size ciphertext, Proceedings of the EUROCRYPT'05, LNCS 3494, Springer-Verlag, Aarhus, Denmark, 2005; 440–456.
    • (2005) Proceedings of the EUROCRYPT'05, LNCS 3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.J.3
  • 25
    • 0031619016 scopus 로고    scopus 로고
    • The random oracle methodology, revisited (preliminary version)
    • Dallas
    • Canetti R, Goldreich O, Halevi S. The random oracle methodology, revisited (preliminary version), Proceedings of the STOC'98, Dallas, 1998; 209–218.
    • (1998) Proceedings of the STOC'98 , pp. 209-218
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 26
    • 35048832490 scopus 로고    scopus 로고
    • An uninstantiable random-oracle-model scheme for a hybrid-encryption problem
    • Springer-Verlag, Interlaken, Switzerland
    • Bellare M, Boldyreva A, Palacio A. An uninstantiable random-oracle-model scheme for a hybrid-encryption problem, Proceedings of the EUROCRYPT'04, LNCS 3027, Springer-Verlag, Interlaken, Switzerland, 2004; 171–188.
    • (2004) Proceedings of the EUROCRYPT'04, LNCS 3027 , pp. 171-188
    • Bellare, M.1    Boldyreva, A.2    Palacio, A.3
  • 27
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Springer-Verlag, Santa Barbara
    • Shamir A. Identity-based cryptosystems and signature schemes, Proceedings of the CRYPTO'84, LNCS 196, Springer-Verlag, Santa Barbara, 1984; 47–53.
    • (1984) Proceedings of the CRYPTO'84, LNCS 196 , pp. 47-53
    • Shamir, A.1
  • 28
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity-based encryption without random oracles
    • Springer-Verlag, Interlaken, Switzerland
    • Boneh D, Boyen X. Efficient selective-ID secure identity-based encryption without random oracles, Proceedings of the EUROCRYPT'04, LNCS 3027, Springer-Verlag, Interlaken, Switzerland, 2004; 223–238.
    • (2004) Proceedings of the EUROCRYPT'04, LNCS 3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 29
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • Springer-Verlag, Aarhus, Denmark
    • Waters B. Efficient identity-based encryption without random oracles, Proceedings of the EUROCRYPT'05, LNCS 3494, Springer-Verlag, Aarhus, Denmark, 2005; 114–127.
    • (2005) Proceedings of the EUROCRYPT'05, LNCS 3494 , pp. 114-127
    • Waters, B.1
  • 30
    • 77949581448 scopus 로고    scopus 로고
    • New techniques for dual system encryption and fully secure HIBE with short ciphertexts
    • Springer-Verlag, Zurich, Switzerland
    • Lewko AB, Waters B. New techniques for dual system encryption and fully secure HIBE with short ciphertexts, Proceedings of the TCC'10, LNCS 5978, Springer-Verlag, Zurich, Switzerland, 2010; 455–479.
    • (2010) Proceedings of the TCC'10, LNCS 5978 , pp. 455-479
    • Lewko, A.B.1    Waters, B.2
  • 31
    • 79953164949 scopus 로고    scopus 로고
    • Achieving leakage resilience through dual system encryption
    • Springer-Verlag, Providence, Rhode Island
    • Lewko AB, Rouselakis Y, Waters B. Achieving leakage resilience through dual system encryption, Proceedings of the TCC'11, LNCS 6597, Springer-Verlag, Providence, Rhode Island, 2011; 70–88.
    • (2011) Proceedings of the TCC'11, LNCS 6597 , pp. 70-88
    • Lewko, A.B.1    Rouselakis, Y.2    Waters, B.3
  • 32
    • 83755180826 scopus 로고    scopus 로고
    • On the efficient implementation of pairing-based protocols
    • Springer-Verlag, Oxford, UK
    • Scott M. On the efficient implementation of pairing-based protocols, Proceedings of the Cryptography and Coding, LNCS 7089, Springer-Verlag, Oxford, UK, 2011; 296–308.
    • (2011) Proceedings of the Cryptography and Coding, LNCS 7089 , pp. 296-308
    • Scott, M.1
  • 34
    • 84942550160 scopus 로고    scopus 로고
    • Lower bounds for discrete logarithms and related problems
    • Springer-Verlag, Konstanz, Germany
    • Shoup V. Lower bounds for discrete logarithms and related problems, Proceedings of the EUROCRYPT'97, LNCS 1233, Springer-Verlag, Konstanz, Germany, 1997; 256–266.
    • (1997) Proceedings of the EUROCRYPT'97, LNCS 1233 , pp. 256-266
    • Shoup, V.1
  • 35
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: how to generate strong keys from biometrics and other noisy data
    • Dodis Y, Ostrovsky R, Reyzin L, Smith A. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing. 2008; 38(1): 97–139.
    • (2008) SIAM Journal on Computing , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 36
    • 84976779342 scopus 로고
    • Fast probabilistic algorithms for verification of polynomial identities
    • Schwartz JT. Fast probabilistic algorithms for verification of polynomial identities. Journal of the ACM. 1980; 27(4): 701–717.
    • (1980) Journal of the ACM , vol.27 , Issue.4 , pp. 701-717
    • Schwartz, J.T.1
  • 37
    • 84925463455 scopus 로고
    • Probabilistic algorithms for sparse polynomials
    • Springer-Verlag, Marseille, France
    • Zippel R. Probabilistic algorithms for sparse polynomials, Proceedings of the EUROSAM'79, LNCS 72, Springer-Verlag, Marseille, France, 1979; 216–226.
    • (1979) Proceedings of the EUROSAM'79, LNCS 72 , pp. 216-226
    • Zippel, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.