References
- M. Abdalla and L. Reyzin, A New Forward-Secure Digital Signature Scheme, Advances in Cryptology – Asiacrypt 2000, Kyoto, Japan, 2000.
- M. Abdalla, S.K. Miner, and C. Namprempre, Forward-Secure Threshold Signature Schemes, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, 2001.
- R. Anderson, Two remarks on public key cryptology, Invited Lecture at the 4th ACM Conference on Computer and Communications Security, Zurich, Switzerland, 1997. Available at http://www.cl.cam.ac.uk/ftp/users/rja14/forwardsecure.pdf
- M. Bellare and S.K. Miner, A Forward-Secure Digital Signature Scheme, Advances in Cryptology – Crypto 1999, Santa Barbara, CA, 1999.
- M. Bellare and B. Yee, Forward Security in Private-Key Cryptography, The Cryptographer's Track at RSA Conference 2003, San Francisco, CA, 2003.
- D. Boneh, X. Boyen, and E.J. Goh, Hierarchical Identity Based Encryption with Constant Size Ciphertext, Advances in Cryptology – Eurocrypt 2005, Aarhus, Denmark, 2005.
- R. Canetti, S. Halevi, and J. Katz, A Forward-Secure Public-Key Encryption Scheme, Advances in Cryptology – Eurocrypt 2003, Warsaw, Poland, 2003.
- W. Diffie, P.C. Van-Oorschot, and M.J. Weiner, Authentication and authenticated key exchanges, Des. Codes Cryptogr. 2 (1992), pp. 107–125. doi: 10.1007/BF00124891
- C. Gentry, Practical Identity-Based Encryption without Random Oracles, Advances in Cryptology – Eurocrypt 2006, Saint Petersburg, Russia, 2006.
- C. Gentry and A. Silverberg, Hierarchical ID-Based Cryptography, Advances in Cryptology – Asiacrypt 2002, Queenstown, New Zealand, 2002.
- C.G. Günther, An Identity-Based Key-Exchange Protocol, Advances in Cryptology – Eurocrypt 1989, Houthalen, Belgium, 1989.
- G. Itkis and L. Reyzin, Forward-Secure Signatures with Optimal Signing and Verifying, Advances in Cryptology – Crypto 2001, Santa Barbara, CA, 2001.
- A. Kozlov and L. Reyzin, Forward-Secure Signatures with Fast Key Update, 3rd Conference on Security in Communication Networks, Amalfi, Italy, 2002.
- H. Krawczyk, Simple forward-secure signatures from any signature scheme, 7th ACM Conference on Computer and Communications Security, Athens, Greece, 2000.
- Y. Lu, Efficient forward-secure identity-based encryption scheme in the standard model, 2nd International Conference on Theoretical and Mathematical Foundations of Computer Science, Singapore, 2011.
- Y. Lu and J. Li, A practical forward-secure public-key encryption scheme, J. Netw. 6 (2011), pp. 1254–1261.
- Y. Lu and J. Li, Generic construction of forward-secure identity-based encryption, J. Comput. 7 (2012), pp. 3068–3074.
- T. Malkin, D. Micciancio, and S.K. Miner, Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periods, Advances in Cryptology – Eurocrypt 2002, Amsterdam, The Netherlands, 2002.
- A. Sahai, Non-malleable non-interactive zero-knowledge and adaptive chosen-ciphertext security, 40th IEEE Symposium on Foundations of Computer Science, New York, NY, 1999.
- D. Yao, N. Fazio, Y. Dodis, and A. Lysyanskaya, ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption, 11th ACM Conference on Computer and Communications Security, Washington, DC, 2004.
- J. Yu, F. Kong, X. Cheng, R. Hao, and J. Fan, Forward-secure identity-based public-key encryption without random oracles, Fundam. Inform. 111 (2011), pp. 241–256.