106
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

New forward-secure public-key encryption without random oracles

&
Pages 2603-2613 | Received 12 Sep 2012, Accepted 20 May 2013, Published online: 01 Jul 2013

References

  • M. Abdalla and L. Reyzin, A New Forward-Secure Digital Signature Scheme, Advances in Cryptology – Asiacrypt 2000, Kyoto, Japan, 2000.
  • M. Abdalla, S.K. Miner, and C. Namprempre, Forward-Secure Threshold Signature Schemes, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, 2001.
  • R. Anderson, Two remarks on public key cryptology, Invited Lecture at the 4th ACM Conference on Computer and Communications Security, Zurich, Switzerland, 1997. Available at http://www.cl.cam.ac.uk/ftp/users/rja14/forwardsecure.pdf
  • M. Bellare and S.K. Miner, A Forward-Secure Digital Signature Scheme, Advances in Cryptology – Crypto 1999, Santa Barbara, CA, 1999.
  • M. Bellare and B. Yee, Forward Security in Private-Key Cryptography, The Cryptographer's Track at RSA Conference 2003, San Francisco, CA, 2003.
  • D. Boneh, X. Boyen, and E.J. Goh, Hierarchical Identity Based Encryption with Constant Size Ciphertext, Advances in Cryptology – Eurocrypt 2005, Aarhus, Denmark, 2005.
  • R. Canetti, S. Halevi, and J. Katz, A Forward-Secure Public-Key Encryption Scheme, Advances in Cryptology – Eurocrypt 2003, Warsaw, Poland, 2003.
  • W. Diffie, P.C. Van-Oorschot, and M.J. Weiner, Authentication and authenticated key exchanges, Des. Codes Cryptogr. 2 (1992), pp. 107–125. doi: 10.1007/BF00124891
  • C. Gentry, Practical Identity-Based Encryption without Random Oracles, Advances in Cryptology – Eurocrypt 2006, Saint Petersburg, Russia, 2006.
  • C. Gentry and A. Silverberg, Hierarchical ID-Based Cryptography, Advances in Cryptology – Asiacrypt 2002, Queenstown, New Zealand, 2002.
  • C.G. Günther, An Identity-Based Key-Exchange Protocol, Advances in Cryptology – Eurocrypt 1989, Houthalen, Belgium, 1989.
  • G. Itkis and L. Reyzin, Forward-Secure Signatures with Optimal Signing and Verifying, Advances in Cryptology – Crypto 2001, Santa Barbara, CA, 2001.
  • A. Kozlov and L. Reyzin, Forward-Secure Signatures with Fast Key Update, 3rd Conference on Security in Communication Networks, Amalfi, Italy, 2002.
  • H. Krawczyk, Simple forward-secure signatures from any signature scheme, 7th ACM Conference on Computer and Communications Security, Athens, Greece, 2000.
  • Y. Lu, Efficient forward-secure identity-based encryption scheme in the standard model, 2nd International Conference on Theoretical and Mathematical Foundations of Computer Science, Singapore, 2011.
  • Y. Lu and J. Li, A practical forward-secure public-key encryption scheme, J. Netw. 6 (2011), pp. 1254–1261.
  • Y. Lu and J. Li, Generic construction of forward-secure identity-based encryption, J. Comput. 7 (2012), pp. 3068–3074.
  • T. Malkin, D. Micciancio, and S.K. Miner, Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periods, Advances in Cryptology – Eurocrypt 2002, Amsterdam, The Netherlands, 2002.
  • A. Sahai, Non-malleable non-interactive zero-knowledge and adaptive chosen-ciphertext security, 40th IEEE Symposium on Foundations of Computer Science, New York, NY, 1999.
  • D. Yao, N. Fazio, Y. Dodis, and A. Lysyanskaya, ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption, 11th ACM Conference on Computer and Communications Security, Washington, DC, 2004.
  • J. Yu, F. Kong, X. Cheng, R. Hao, and J. Fan, Forward-secure identity-based public-key encryption without random oracles, Fundam. Inform. 111 (2011), pp. 241–256.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.