-
Previous Article
Some new results on cross correlation of $p$-ary $m$-sequence and its decimated sequence
- AMC Home
- This Issue
-
Next Article
Weight distributions of a class of cyclic codes from $\Bbb F_l$-conjugates
An improved certificateless strong key-insulated signature scheme in the standard model
1. | College of Computer and Information Engineering, Hohai University, 8 Focheng Xilu, Nanjing, Jiangsu 211100, China, China, China |
References:
[1] |
S. S. Al-Riyami and K. G. Paterson, Certificateless public key cryptography, in Proc. ASIACRYPT 2003, Springer-Verlag, 2003, 452-473.
doi: 10.1007/978-3-540-40061-5_29. |
[2] |
J. Baek, R. Safavi-Naini and W. Susilo, Certificateless public key encryption without pairing, in Proc. ISC 2005, Springer-Verlag, 2005, 134-148. |
[3] |
M. Bellare and A. Palacio, Protecting against key exposure: strongly key-insulated encryption with optimal threshold, in Proc. AAECC 2006, Springer-Verlag, 2006, 379-396.
doi: 10.1007/s00200-005-0183-y. |
[4] |
K. Y. Choi, J. H. Park, J. Y. Hwang and D. H. Lee, Efficient certificateless signature schemes, in Proc. ACNS 2007, Springer-Verlag, 2007, 443-458.
doi: 10.1007/978-3-540-73489-5_5. |
[5] |
A. W. Dent, B. Libert and K. G. Paterson, Certificateless encryption schemes strongly secure in the standard model, in Proc. PKC 2008, Springer-Verlag, 2008, 344-359.
doi: 10.1007/978-3-540-78440-1_20. |
[6] |
Y. Dodis, J. Katz, S. Xu and M. Yung, Key-insulated public-key cryptosystems, in Proc. EUROCRYPT 2002, Springer-Verlag, 2002, 65-82.
doi: 10.1007/3-540-46035-7_5. |
[7] |
Y. Dodis, J. Katz, S. Xu and M. Yung, Strong key-insulated signature schemes, in Proc. PKC 2003, Springer-Verlag, 2003, 130-144.
doi: 10.1007/3-540-36288-6_10. |
[8] |
N. Gonzalez-Deleito, O. Markowitch and E. Dall'Olio, A new key-insulated signature scheme, in Proc. ICICS 2004, Springer-Verlag, 2004, 465-479. |
[9] |
G. Hanaoka, Y. Hanaoka and H. Imai, Parallel key-insulated public key encryption, in Proc. PKC 2006, Springer-Verlag, 2006, 105-122.
doi: 10.1007/11745853_8. |
[10] |
Y. Hanaoka, G. Hanaoka, J. Shikata and H. Imai, Unconditionally secure key insulated cryptosystems: models, bounds and constructions, in Proc. ICICS 2002, Springer-Verlag, 2002, 85-96.
doi: 10.1007/3-540-36178-2_5. |
[11] |
Y. Hanaoka, G. Hanaoka, J. Shikata and H. Imai, Identity-based hierarchical strongly key-insulated encryption and its application, in Proc. ASIACRYPT 2005, Springer-Verlag, 2005, 495-514.
doi: 10.1007/11593447_27. |
[12] |
D. He, B. Huang and J. Chen, New certificateless short signature scheme, IET - Information Security, 7 (2013), 113-117. |
[13] |
B. Libert and J. Quisquater, On constructing certificateless cryptosystems from identity based encryption, in Proc. PKC 2006, Springer-Verlag, 2006, 474-490.
doi: 10.1007/11745853_31. |
[14] |
J. K. Liu, M. H. Au and W. Susilo, Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model, in Proc. ASIACCS 2007, ACM, 2007, 302-311. |
[15] |
J. K. Liu and D. S. Wong, Solutions to key exposure problem in ring signature, Int. J. Network Sec., 6 (2008), 170-180. |
[16] |
W. Qiu, Y. Zhou, B. Zhu, Y. Zheng, M. Wen and Z. Gong, Key-insulated encryption based key pre-distribution scheme for WSN, in Proc. ISA 2009, Springer-Verlag, 2009, 200-209. |
[17] |
A. Shamir, Identity-based cryptosystems and signature schemes, in Proc. CRYPTO 1984, Springer-Verlag, 1984, 47-53.
doi: 10.1007/3-540-39568-7_5. |
[18] |
Y. Sun and H. Li, Short-ciphertext and BDH-based CCA2 secure certificateless encryption, Sci. China Inf. Sci., 53 (2010) 2005-2015.
doi: 10.1007/s11432-010-4076-8. |
[19] |
R. Tso, X. Huang and W. Susilo, Strongly secure certificateless short signatures, J. Syst. Software, 85 (2012) 1409-1417. |
[20] |
R. Tso, X. Yi and X. Huang, Efficient and short certificateless signature, in Proc. CANS 2008, Springer-Verlag, 2008, 64-79. |
[21] |
Z. Wan, X. Lai, J. Weng, S. Liu and X. Hong, Identity-based key-insulated proxy signature, J. Electronics (China), 26 (2009) 853-858. |
[22] |
Z. Wan, X. Lai, J. Weng, S. Liu, Y. Long and X. Hong, Certificateless key-insulated signature without random oracles, J. Zhejiang Univ. Sci. A, 10 (2009), 1790-1800. |
[23] |
Z. Wan, X. Meng and X. Hong, Certificateless strong key-insulated signature without random oracles, J. Shanghai Jiaotong Univ. (Sci), 16 (2011), 571-576. |
[24] |
B. Waters, Efficient identity-based encryption without random oracles, in Proc. EUROCRYPT 2005, Springer-Verlag, 2005, 114-127.
doi: 10.1007/11426639_7. |
[25] |
J. Weng, S. Liu, K. Chen and C. Ma, Identity-based key-insulated signature without random oracles, in Proc. CIS 2006, Springer-Verlag, 2007, 470-480.
doi: 10.1007/11941378_29. |
[26] |
J. Weng, S. Liu, K. Chen, D. Zheng and W. Qiu, Identity-based Threshold key-insulated encryption without random oracles, in Proc. CT-RSA 2008, Springer-Verlag, 2008, 203-220.
doi: 10.1007/978-3-540-79263-5_13. |
[27] |
W. Yang, F. Zhang and L. Shen, Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles, Secur. Commun. Networks, 7 (2014) 445-454. |
[28] |
D. H. Yum and P. J. Lee, Efficient key updating signature schemes based on IBS, in Proc. Crypt. Coding 2003, Springer-Verlag, 2003, 16-18.
doi: 10.1007/978-3-540-40974-8_14. |
[29] |
F. Zhang, R. Safavi-Naini and W. Susilo, An efficient signature scheme from bilinear parings and its applications, in Proc. PKC 2004, Springer-Verlag, 2004, 277-290.
doi: 10.1007/978-3-540-24632-9_20. |
[30] |
Z. Zhang, D. Wong, J. Xu and D. Feng, Certificateless public-key signature: security model and efficient construction, in Proc. ACNS 2006, Springer-Verlag, 2006, 293-308. |
[31] |
Y. Zhou, Z. Cao and Z. Chai, Identity based key insulated signature, in Proc. ISPEC 2006, Springer-Verlag, 2006, 226-234. |
show all references
References:
[1] |
S. S. Al-Riyami and K. G. Paterson, Certificateless public key cryptography, in Proc. ASIACRYPT 2003, Springer-Verlag, 2003, 452-473.
doi: 10.1007/978-3-540-40061-5_29. |
[2] |
J. Baek, R. Safavi-Naini and W. Susilo, Certificateless public key encryption without pairing, in Proc. ISC 2005, Springer-Verlag, 2005, 134-148. |
[3] |
M. Bellare and A. Palacio, Protecting against key exposure: strongly key-insulated encryption with optimal threshold, in Proc. AAECC 2006, Springer-Verlag, 2006, 379-396.
doi: 10.1007/s00200-005-0183-y. |
[4] |
K. Y. Choi, J. H. Park, J. Y. Hwang and D. H. Lee, Efficient certificateless signature schemes, in Proc. ACNS 2007, Springer-Verlag, 2007, 443-458.
doi: 10.1007/978-3-540-73489-5_5. |
[5] |
A. W. Dent, B. Libert and K. G. Paterson, Certificateless encryption schemes strongly secure in the standard model, in Proc. PKC 2008, Springer-Verlag, 2008, 344-359.
doi: 10.1007/978-3-540-78440-1_20. |
[6] |
Y. Dodis, J. Katz, S. Xu and M. Yung, Key-insulated public-key cryptosystems, in Proc. EUROCRYPT 2002, Springer-Verlag, 2002, 65-82.
doi: 10.1007/3-540-46035-7_5. |
[7] |
Y. Dodis, J. Katz, S. Xu and M. Yung, Strong key-insulated signature schemes, in Proc. PKC 2003, Springer-Verlag, 2003, 130-144.
doi: 10.1007/3-540-36288-6_10. |
[8] |
N. Gonzalez-Deleito, O. Markowitch and E. Dall'Olio, A new key-insulated signature scheme, in Proc. ICICS 2004, Springer-Verlag, 2004, 465-479. |
[9] |
G. Hanaoka, Y. Hanaoka and H. Imai, Parallel key-insulated public key encryption, in Proc. PKC 2006, Springer-Verlag, 2006, 105-122.
doi: 10.1007/11745853_8. |
[10] |
Y. Hanaoka, G. Hanaoka, J. Shikata and H. Imai, Unconditionally secure key insulated cryptosystems: models, bounds and constructions, in Proc. ICICS 2002, Springer-Verlag, 2002, 85-96.
doi: 10.1007/3-540-36178-2_5. |
[11] |
Y. Hanaoka, G. Hanaoka, J. Shikata and H. Imai, Identity-based hierarchical strongly key-insulated encryption and its application, in Proc. ASIACRYPT 2005, Springer-Verlag, 2005, 495-514.
doi: 10.1007/11593447_27. |
[12] |
D. He, B. Huang and J. Chen, New certificateless short signature scheme, IET - Information Security, 7 (2013), 113-117. |
[13] |
B. Libert and J. Quisquater, On constructing certificateless cryptosystems from identity based encryption, in Proc. PKC 2006, Springer-Verlag, 2006, 474-490.
doi: 10.1007/11745853_31. |
[14] |
J. K. Liu, M. H. Au and W. Susilo, Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model, in Proc. ASIACCS 2007, ACM, 2007, 302-311. |
[15] |
J. K. Liu and D. S. Wong, Solutions to key exposure problem in ring signature, Int. J. Network Sec., 6 (2008), 170-180. |
[16] |
W. Qiu, Y. Zhou, B. Zhu, Y. Zheng, M. Wen and Z. Gong, Key-insulated encryption based key pre-distribution scheme for WSN, in Proc. ISA 2009, Springer-Verlag, 2009, 200-209. |
[17] |
A. Shamir, Identity-based cryptosystems and signature schemes, in Proc. CRYPTO 1984, Springer-Verlag, 1984, 47-53.
doi: 10.1007/3-540-39568-7_5. |
[18] |
Y. Sun and H. Li, Short-ciphertext and BDH-based CCA2 secure certificateless encryption, Sci. China Inf. Sci., 53 (2010) 2005-2015.
doi: 10.1007/s11432-010-4076-8. |
[19] |
R. Tso, X. Huang and W. Susilo, Strongly secure certificateless short signatures, J. Syst. Software, 85 (2012) 1409-1417. |
[20] |
R. Tso, X. Yi and X. Huang, Efficient and short certificateless signature, in Proc. CANS 2008, Springer-Verlag, 2008, 64-79. |
[21] |
Z. Wan, X. Lai, J. Weng, S. Liu and X. Hong, Identity-based key-insulated proxy signature, J. Electronics (China), 26 (2009) 853-858. |
[22] |
Z. Wan, X. Lai, J. Weng, S. Liu, Y. Long and X. Hong, Certificateless key-insulated signature without random oracles, J. Zhejiang Univ. Sci. A, 10 (2009), 1790-1800. |
[23] |
Z. Wan, X. Meng and X. Hong, Certificateless strong key-insulated signature without random oracles, J. Shanghai Jiaotong Univ. (Sci), 16 (2011), 571-576. |
[24] |
B. Waters, Efficient identity-based encryption without random oracles, in Proc. EUROCRYPT 2005, Springer-Verlag, 2005, 114-127.
doi: 10.1007/11426639_7. |
[25] |
J. Weng, S. Liu, K. Chen and C. Ma, Identity-based key-insulated signature without random oracles, in Proc. CIS 2006, Springer-Verlag, 2007, 470-480.
doi: 10.1007/11941378_29. |
[26] |
J. Weng, S. Liu, K. Chen, D. Zheng and W. Qiu, Identity-based Threshold key-insulated encryption without random oracles, in Proc. CT-RSA 2008, Springer-Verlag, 2008, 203-220.
doi: 10.1007/978-3-540-79263-5_13. |
[27] |
W. Yang, F. Zhang and L. Shen, Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles, Secur. Commun. Networks, 7 (2014) 445-454. |
[28] |
D. H. Yum and P. J. Lee, Efficient key updating signature schemes based on IBS, in Proc. Crypt. Coding 2003, Springer-Verlag, 2003, 16-18.
doi: 10.1007/978-3-540-40974-8_14. |
[29] |
F. Zhang, R. Safavi-Naini and W. Susilo, An efficient signature scheme from bilinear parings and its applications, in Proc. PKC 2004, Springer-Verlag, 2004, 277-290.
doi: 10.1007/978-3-540-24632-9_20. |
[30] |
Z. Zhang, D. Wong, J. Xu and D. Feng, Certificateless public-key signature: security model and efficient construction, in Proc. ACNS 2006, Springer-Verlag, 2006, 293-308. |
[31] |
Y. Zhou, Z. Cao and Z. Chai, Identity based key insulated signature, in Proc. ISPEC 2006, Springer-Verlag, 2006, 226-234. |
[1] |
Mohamed Baouch, Juan Antonio López-Ramos, Blas Torrecillas, Reto Schnyder. An active attack on a distributed Group Key Exchange system. Advances in Mathematics of Communications, 2017, 11 (4) : 715-717. doi: 10.3934/amc.2017052 |
[2] |
Yvo Desmedt, Niels Duif, Henk van Tilborg, Huaxiong Wang. Bounds and constructions for key distribution schemes. Advances in Mathematics of Communications, 2009, 3 (3) : 273-293. doi: 10.3934/amc.2009.3.273 |
[3] |
Giacomo Micheli. Cryptanalysis of a noncommutative key exchange protocol. Advances in Mathematics of Communications, 2015, 9 (2) : 247-253. doi: 10.3934/amc.2015.9.247 |
[4] |
Z. Reichstein and B. Youssin. Parusinski's "Key Lemma" via algebraic geometry. Electronic Research Announcements, 1999, 5: 136-145. |
[5] |
Felipe Cabarcas, Daniel Cabarcas, John Baena. Efficient public-key operation in multivariate schemes. Advances in Mathematics of Communications, 2019, 13 (2) : 343-371. doi: 10.3934/amc.2019023 |
[6] |
Gerhard Frey. Relations between arithmetic geometry and public key cryptography. Advances in Mathematics of Communications, 2010, 4 (2) : 281-305. doi: 10.3934/amc.2010.4.281 |
[7] |
Rainer Steinwandt, Adriana Suárez Corona. Attribute-based group key establishment. Advances in Mathematics of Communications, 2010, 4 (3) : 381-398. doi: 10.3934/amc.2010.4.381 |
[8] |
Gérard Maze, Chris Monico, Joachim Rosenthal. Public key cryptography based on semigroup actions. Advances in Mathematics of Communications, 2007, 1 (4) : 489-507. doi: 10.3934/amc.2007.1.489 |
[9] |
Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E. Gunnells. Ironwood meta key agreement and authentication protocol. Advances in Mathematics of Communications, 2021, 15 (3) : 397-413. doi: 10.3934/amc.2020073 |
[10] |
Jintai Ding, Zheng Zhang, Joshua Deaton. The singularity attack to the multivariate signature scheme HIMQ-3. Advances in Mathematics of Communications, 2021, 15 (1) : 65-72. doi: 10.3934/amc.2020043 |
[11] |
Mohammad Sadeq Dousti, Rasool Jalili. FORSAKES: A forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes. Advances in Mathematics of Communications, 2015, 9 (4) : 471-514. doi: 10.3934/amc.2015.9.471 |
[12] |
Rainer Steinwandt, Adriana Suárez Corona. Cryptanalysis of a 2-party key establishment based on a semigroup action problem. Advances in Mathematics of Communications, 2011, 5 (1) : 87-92. doi: 10.3934/amc.2011.5.87 |
[13] |
Joan-Josep Climent, Juan Antonio López-Ramos. Public key protocols over the ring $E_{p}^{(m)}$. Advances in Mathematics of Communications, 2016, 10 (4) : 861-870. doi: 10.3934/amc.2016046 |
[14] |
Jake Bouvrie, Boumediene Hamzi. Kernel methods for the approximation of some key quantities of nonlinear systems. Journal of Computational Dynamics, 2017, 4 (1&2) : 1-19. doi: 10.3934/jcd.2017001 |
[15] |
Sikhar Patranabis, Debdeep Mukhopadhyay. Identity-based key aggregate cryptosystem from multilinear maps. Advances in Mathematics of Communications, 2019, 13 (4) : 759-778. doi: 10.3934/amc.2019044 |
[16] |
Yu-Chi Chen. Security analysis of public key encryption with filtered equality test. Advances in Mathematics of Communications, 2021 doi: 10.3934/amc.2021053 |
[17] |
Javier de la Cruz, Ricardo Villanueva-Polanco. Public key cryptography based on twisted dihedral group algebras. Advances in Mathematics of Communications, 2022 doi: 10.3934/amc.2022031 |
[18] |
Chandan Dey, Sumit Kumar Pandey, Tapabrata Roy, Santanu Sarkar. Differential faultt attack on DEFAULT. Advances in Mathematics of Communications, 2022 doi: 10.3934/amc.2022035 |
[19] |
Riccardo Aragona, Marco Calderini, Roberto Civino. Some group-theoretical results on Feistel Networks in a long-key scenario. Advances in Mathematics of Communications, 2020, 14 (4) : 727-743. doi: 10.3934/amc.2020093 |
[20] |
Anton Stolbunov. Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves. Advances in Mathematics of Communications, 2010, 4 (2) : 215-235. doi: 10.3934/amc.2010.4.215 |
2020 Impact Factor: 0.935
Tools
Metrics
Other articles
by authors
[Back to Top]