搜索结果: 1-10 共查到“Key insulated”相关记录10条 . 查询时间(0.073 秒)
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key
Signature Scheme Publicly Derived Public Key Key-Insulated Security
2018/11/6
Since the introduction of Bitcoin in 2008, cryptocurrency has been undergoing a quick and explosive development. At the same time, privacy protection, one of the key merits of cryptocurrency, has attr...
Certificateless Key Insulated Encryption: Cryptographic Primitive for Achieving Key-escrow free and Key-exposure Resilience
Bilinear Pairing Certificateless cryptography Key insulated
2016/5/24
Certificateless encryption (CLE) alleviates the heavy certificate management in traditional public key encryption and the key escrow problem in the ID-based encryption simultaneously. Current CLE sche...
Identity-based Hierarchical Key-insulated Encryption without Random Oracles
public-key cryptography Key-insulated encryption Identity-based hierarchical key-insulated encryption
2016/1/26
Key-insulated encryption is one of the effective solutions to
a key exposure problem. Recently, identity-based encryption (IBE) has
been used as one of fundamental cryptographic primitives in a wide...
Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes
key exposure parallel key-insulated encryption one-time forward secure public key encryption identity-based encryption
2010/9/9
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete key-insulated encryptio...
Key-Insulated Public-Key Cryptosystems.
Protecting against Key Exposure:Strongly Key-Insulated Encryption with Optimal Threshold
Key exposure key update encryption
2009/4/14
A new framework for protection against key exposure was recently suggested by Dodis
et. al. [16]. We take its realization further towards practice by presenting simple new schemes
that provide benef...
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
Identity-Based Hierarchical Strongly Key-Insulated Encryption IBE HIBE
2009/4/2
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption
(IBE). IBE is a public key cryptosystem where a public key is an arbitrary string. In practice, key
...
Universal Forgeability of Wang-Wu-Wang Key-Insulated Signature Scheme
key-insulated signature scheme universal forgeability
2009/4/1
Wang et al. recently proposed a new perfect and strong key-insulated signature scheme in [1]. We find that the scheme is universally forgeable.In the paper we present a simple and direct attack on it....
Timed-Release and Key-Insulated Public Key Encryption
timed-release authenticated encryption key-insulated encryption
2009/3/27
In this paper we consider two security notions related to
Identity Based Encryption: Key-insulated public key encryption, introduced
by Dodis, Katz, Xu and Yung; and Timed-Release Public Key
crypto...
Identity-Based Parallel Key-Insulated Signature: Framework and Construction
Parallel Key-Insulated Identity-Based Signature Key-Exposure Bilinear Pairings
2014/3/11
To minimize the damage caused by key-exposure in ID-based signatures, in ISPEC’06 Zhou et al (2006) proposed an ID-based key-insulated signature (IBKIS) scheme. However, their scheme is not strong key...