`a`
Advances in Mathematics of Communications (AMC)
 

An improved certificateless strong key-insulated signature scheme in the standard model
Pages: 353 - 373, Issue 3, August 2015

doi:10.3934/amc.2015.9.353      Abstract        References        Full text (444.6K)           Related Articles

Yang Lu - College of Computer and Information Engineering, Hohai University, 8 Focheng Xilu, Nanjing, Jiangsu 211100, China (email)
Quanling Zhang - College of Computer and Information Engineering, Hohai University, 8 Focheng Xilu, Nanjing, Jiangsu 211100, China (email)
Jiguo Li - College of Computer and Information Engineering, Hohai University, 8 Focheng Xilu, Nanjing, Jiangsu 211100, China (email)

1 S. S. Al-Riyami and K. G. Paterson, Certificateless public key cryptography, in Proc. ASIACRYPT 2003, Springer-Verlag, 2003, 452-473.       
2 J. Baek, R. Safavi-Naini and W. Susilo, Certificateless public key encryption without pairing, in Proc. ISC 2005, Springer-Verlag, 2005, 134-148.
3 M. Bellare and A. Palacio, Protecting against key exposure: strongly key-insulated encryption with optimal threshold, in Proc. AAECC 2006, Springer-Verlag, 2006, 379-396.       
4 K. Y. Choi, J. H. Park, J. Y. Hwang and D. H. Lee, Efficient certificateless signature schemes, in Proc. ACNS 2007, Springer-Verlag, 2007, 443-458.       
5 A. W. Dent, B. Libert and K. G. Paterson, Certificateless encryption schemes strongly secure in the standard model, in Proc. PKC 2008, Springer-Verlag, 2008, 344-359.       
6 Y. Dodis, J. Katz, S. Xu and M. Yung, Key-insulated public-key cryptosystems, in Proc. EUROCRYPT 2002, Springer-Verlag, 2002, 65-82.       
7 Y. Dodis, J. Katz, S. Xu and M. Yung, Strong key-insulated signature schemes, in Proc. PKC 2003, Springer-Verlag, 2003, 130-144.       
8 N. Gonzalez-Deleito, O. Markowitch and E. Dall'Olio, A new key-insulated signature scheme, in Proc. ICICS 2004, Springer-Verlag, 2004, 465-479.
9 G. Hanaoka, Y. Hanaoka and H. Imai, Parallel key-insulated public key encryption, in Proc. PKC 2006, Springer-Verlag, 2006, 105-122.       
10 Y. Hanaoka, G. Hanaoka, J. Shikata and H. Imai, Unconditionally secure key insulated cryptosystems: models, bounds and constructions, in Proc. ICICS 2002, Springer-Verlag, 2002, 85-96.       
11 Y. Hanaoka, G. Hanaoka, J. Shikata and H. Imai, Identity-based hierarchical strongly key-insulated encryption and its application, in Proc. ASIACRYPT 2005, Springer-Verlag, 2005, 495-514.       
12 D. He, B. Huang and J. Chen, New certificateless short signature scheme, IET - Information Security, 7 (2013), 113-117.
13 B. Libert and J. Quisquater, On constructing certificateless cryptosystems from identity based encryption, in Proc. PKC 2006, Springer-Verlag, 2006, 474-490.       
14 J. K. Liu, M. H. Au and W. Susilo, Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model, in Proc. ASIACCS 2007, ACM, 2007, 302-311.
15 J. K. Liu and D. S. Wong, Solutions to key exposure problem in ring signature, Int. J. Network Sec., 6 (2008), 170-180.
16 W. Qiu, Y. Zhou, B. Zhu, Y. Zheng, M. Wen and Z. Gong, Key-insulated encryption based key pre-distribution scheme for WSN, in Proc. ISA 2009, Springer-Verlag, 2009, 200-209.
17 A. Shamir, Identity-based cryptosystems and signature schemes, in Proc. CRYPTO 1984, Springer-Verlag, 1984, 47-53.       
18 Y. Sun and H. Li, Short-ciphertext and BDH-based CCA2 secure certificateless encryption, Sci. China Inf. Sci., 53 (2010) 2005-2015.       
19 R. Tso, X. Huang and W. Susilo, Strongly secure certificateless short signatures, J. Syst. Software, 85 (2012) 1409-1417.
20 R. Tso, X. Yi and X. Huang, Efficient and short certificateless signature, in Proc. CANS 2008, Springer-Verlag, 2008, 64-79.
21 Z. Wan, X. Lai, J. Weng, S. Liu and X. Hong, Identity-based key-insulated proxy signature, J. Electronics (China), 26 (2009) 853-858.
22 Z. Wan, X. Lai, J. Weng, S. Liu, Y. Long and X. Hong, Certificateless key-insulated signature without random oracles, J. Zhejiang Univ. Sci. A, 10 (2009), 1790-1800.
23 Z. Wan, X. Meng and X. Hong, Certificateless strong key-insulated signature without random oracles, J. Shanghai Jiaotong Univ. (Sci), 16 (2011), 571-576.
24 B. Waters, Efficient identity-based encryption without random oracles, in Proc. EUROCRYPT 2005, Springer-Verlag, 2005, 114-127.       
25 J. Weng, S. Liu, K. Chen and C. Ma, Identity-based key-insulated signature without random oracles, in Proc. CIS 2006, Springer-Verlag, 2007, 470-480.       
26 J. Weng, S. Liu, K. Chen, D. Zheng and W. Qiu, Identity-based Threshold key-insulated encryption without random oracles, in Proc. CT-RSA 2008, Springer-Verlag, 2008, 203-220.       
27 W. Yang, F. Zhang and L. Shen, Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles, Secur. Commun. Networks, 7 (2014) 445-454.
28 D. H. Yum and P. J. Lee, Efficient key updating signature schemes based on IBS, in Proc. Crypt. Coding 2003, Springer-Verlag, 2003, 16-18.       
29 F. Zhang, R. Safavi-Naini and W. Susilo, An efficient signature scheme from bilinear parings and its applications, in Proc. PKC 2004, Springer-Verlag, 2004, 277-290.       
30 Z. Zhang, D. Wong, J. Xu and D. Feng, Certificateless public-key signature: security model and efficient construction, in Proc. ACNS 2006, Springer-Verlag, 2006, 293-308.
31 Y. Zhou, Z. Cao and Z. Chai, Identity based key insulated signature, in Proc. ISPEC 2006, Springer-Verlag, 2006, 226-234.

Go to top