Strong key-insulated signature schemes (original) (raw)
Related papers
A New Key-Insulated Signature Scheme
2000
A Signature Scheme as Secure as the Diffie-Hellman Problem
Lecture Notes in Computer Science, 2003
Certificate-based signatures revisited
2009
Compact Leakage-Free ID-Based Signature Scheme with Applications to Secret Handshakes
Wireless Personal Communications, 2014
Certificate-Based Signature: Security Model and Efficient Construction
2007
A Signature Scheme with Message Recovery as Secure as Discrete Logarithm
Lecture Notes in Computer Science, 1999
Certificateless signature: a new security model and an improved generic construction
Designs, Codes and Cryptography, 2007
On the Security of Two Key-Updating Signature Schemes
Lecture Notes in Computer Science, 2005
Key-Insulated Public Key Cryptosystems
2002
On the Security of Certificateless Signcryption Schemes
A Strongly Secure Certificateless Digital Signature Scheme in the Random Oracle Model
2016
A New Signature Scheme without Random Oracles and Its Applications
2008
Signature Schemes Secure Against Hard-to-Invert Leakage
Journal of Cryptology, 2015
SiBIR: Signer-Base Intrusion-Resilient Signatures
Lecture Notes in Computer Science, 2002
Certificateless Signatures: New Schemes and Security Models
The Computer Journal, 2012
On the Security of Certificateless Signature Schemes
A New Approach to Constructing Digital Signature Schemes (Extended Paper)
2019
Efficient Unconditionally Secure Digital Signatures
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
The Joint Signature and Encryption Revisited ∗
2013
2021
A Short Certificate-based Signature Scheme with Provable Security
Information Technology And Control, 2016
A Robust Identity-Based Signature Scheme that Avoids Key Escrow Problem
Proceedings of the 6th ETSI Annual Security Workshop, January 19 – 20, 2011, Sophia Antipolis, France. docbox.etsi.org, 2011
2021
The exact security of an identity based signature and its applications
2004
Security of verifiably encrypted signatures and a construction without random oracles
Pairing-Based CryptographyPairing 2009, 2009
Efficient Signature Schemes with Tight Reductions to the Diffie-Hellman Problems
Journal of Cryptology, 2007
Efficient Public-Key Cryptography in the Presence of Key Leakage
2010
Strongly Secure Revocable ID-based Signature without Random Oracles
Information Technology And Control, 2014
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 2019
On the Security of Certificateless Signature Schemes from Asiacrypt 2003
Lecture Notes in Computer Science, 2005
Unconditionally Secure Signatures
IACR Cryptol. ePrint Arch., 2016
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Lecture Notes in Computer Science, 2010
Tightly-Secure Signatures from Lossy Identification Schemes
Advances in Cryptology – EUROCRYPT 2012, 2012
An Efficient Key Escrow-Free Identity-Based Signature Scheme
2017