Citation: |
[1] |
S. S. Al-Riyami and K. G. Paterson, Certificateless public key cryptography, in Proc. ASIACRYPT 2003, Springer-Verlag, 2003, 452-473.doi: 10.1007/978-3-540-40061-5_29. |
[2] |
J. Baek, R. Safavi-Naini and W. Susilo, Certificateless public key encryption without pairing, in Proc. ISC 2005, Springer-Verlag, 2005, 134-148. |
[3] |
M. Bellare and A. Palacio, Protecting against key exposure: strongly key-insulated encryption with optimal threshold, in Proc. AAECC 2006, Springer-Verlag, 2006, 379-396.doi: 10.1007/s00200-005-0183-y. |
[4] |
K. Y. Choi, J. H. Park, J. Y. Hwang and D. H. Lee, Efficient certificateless signature schemes, in Proc. ACNS 2007, Springer-Verlag, 2007, 443-458.doi: 10.1007/978-3-540-73489-5_5. |
[5] |
A. W. Dent, B. Libert and K. G. Paterson, Certificateless encryption schemes strongly secure in the standard model, in Proc. PKC 2008, Springer-Verlag, 2008, 344-359.doi: 10.1007/978-3-540-78440-1_20. |
[6] |
Y. Dodis, J. Katz, S. Xu and M. Yung, Key-insulated public-key cryptosystems, in Proc. EUROCRYPT 2002, Springer-Verlag, 2002, 65-82.doi: 10.1007/3-540-46035-7_5. |
[7] |
Y. Dodis, J. Katz, S. Xu and M. Yung, Strong key-insulated signature schemes, in Proc. PKC 2003, Springer-Verlag, 2003, 130-144.doi: 10.1007/3-540-36288-6_10. |
[8] |
N. Gonzalez-Deleito, O. Markowitch and E. Dall'Olio, A new key-insulated signature scheme, in Proc. ICICS 2004, Springer-Verlag, 2004, 465-479. |
[9] |
G. Hanaoka, Y. Hanaoka and H. Imai, Parallel key-insulated public key encryption, in Proc. PKC 2006, Springer-Verlag, 2006, 105-122.doi: 10.1007/11745853_8. |
[10] |
Y. Hanaoka, G. Hanaoka, J. Shikata and H. Imai, Unconditionally secure key insulated cryptosystems: models, bounds and constructions, in Proc. ICICS 2002, Springer-Verlag, 2002, 85-96.doi: 10.1007/3-540-36178-2_5. |
[11] |
Y. Hanaoka, G. Hanaoka, J. Shikata and H. Imai, Identity-based hierarchical strongly key-insulated encryption and its application, in Proc. ASIACRYPT 2005, Springer-Verlag, 2005, 495-514.doi: 10.1007/11593447_27. |
[12] |
D. He, B. Huang and J. Chen, New certificateless short signature scheme, IET - Information Security, 7 (2013), 113-117. |
[13] |
B. Libert and J. Quisquater, On constructing certificateless cryptosystems from identity based encryption, in Proc. PKC 2006, Springer-Verlag, 2006, 474-490.doi: 10.1007/11745853_31. |
[14] |
J. K. Liu, M. H. Au and W. Susilo, Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model, in Proc. ASIACCS 2007, ACM, 2007, 302-311. |
[15] |
J. K. Liu and D. S. Wong, Solutions to key exposure problem in ring signature, Int. J. Network Sec., 6 (2008), 170-180. |
[16] |
W. Qiu, Y. Zhou, B. Zhu, Y. Zheng, M. Wen and Z. Gong, Key-insulated encryption based key pre-distribution scheme for WSN, in Proc. ISA 2009, Springer-Verlag, 2009, 200-209. |
[17] |
A. Shamir, Identity-based cryptosystems and signature schemes, in Proc. CRYPTO 1984, Springer-Verlag, 1984, 47-53.doi: 10.1007/3-540-39568-7_5. |
[18] |
Y. Sun and H. Li, Short-ciphertext and BDH-based CCA2 secure certificateless encryption, Sci. China Inf. Sci., 53 (2010) 2005-2015.doi: 10.1007/s11432-010-4076-8. |
[19] |
R. Tso, X. Huang and W. Susilo, Strongly secure certificateless short signatures, J. Syst. Software, 85 (2012) 1409-1417. |
[20] |
R. Tso, X. Yi and X. Huang, Efficient and short certificateless signature, in Proc. CANS 2008, Springer-Verlag, 2008, 64-79. |
[21] |
Z. Wan, X. Lai, J. Weng, S. Liu and X. Hong, Identity-based key-insulated proxy signature, J. Electronics (China), 26 (2009) 853-858. |
[22] |
Z. Wan, X. Lai, J. Weng, S. Liu, Y. Long and X. Hong, Certificateless key-insulated signature without random oracles, J. Zhejiang Univ. Sci. A, 10 (2009), 1790-1800. |
[23] |
Z. Wan, X. Meng and X. Hong, Certificateless strong key-insulated signature without random oracles, J. Shanghai Jiaotong Univ. (Sci), 16 (2011), 571-576. |
[24] |
B. Waters, Efficient identity-based encryption without random oracles, in Proc. EUROCRYPT 2005, Springer-Verlag, 2005, 114-127.doi: 10.1007/11426639_7. |
[25] |
J. Weng, S. Liu, K. Chen and C. Ma, Identity-based key-insulated signature without random oracles, in Proc. CIS 2006, Springer-Verlag, 2007, 470-480.doi: 10.1007/11941378_29. |
[26] |
J. Weng, S. Liu, K. Chen, D. Zheng and W. Qiu, Identity-based Threshold key-insulated encryption without random oracles, in Proc. CT-RSA 2008, Springer-Verlag, 2008, 203-220.doi: 10.1007/978-3-540-79263-5_13. |
[27] |
W. Yang, F. Zhang and L. Shen, Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles, Secur. Commun. Networks, 7 (2014) 445-454. |
[28] |
D. H. Yum and P. J. Lee, Efficient key updating signature schemes based on IBS, in Proc. Crypt. Coding 2003, Springer-Verlag, 2003, 16-18.doi: 10.1007/978-3-540-40974-8_14. |
[29] |
F. Zhang, R. Safavi-Naini and W. Susilo, An efficient signature scheme from bilinear parings and its applications, in Proc. PKC 2004, Springer-Verlag, 2004, 277-290.doi: 10.1007/978-3-540-24632-9_20. |
[30] |
Z. Zhang, D. Wong, J. Xu and D. Feng, Certificateless public-key signature: security model and efficient construction, in Proc. ACNS 2006, Springer-Verlag, 2006, 293-308. |
[31] |
Y. Zhou, Z. Cao and Z. Chai, Identity based key insulated signature, in Proc. ISPEC 2006, Springer-Verlag, 2006, 226-234. |