Computer Science ›› 2014, Vol. 41 ›› Issue (Z11): 250-251.
Previous Articles Next Articles
CHEN Zhi-jie,HUANG Kun and XIAN Ming
[1] Shamir A.Identity-Based cryptosystems and signature schemes[C]∥Procedings of the Crypto 1984 .volume 196 of LNCS,1984:47-53 [2] Itkis G,Reyzin L.SiBIR:Signer-base intrusion-resilient signa-tures [C]∥Procedings of the Crypto 2002.volume 2442 of LNCS,2002:499-514 [3] Dodis Y,Katz J,Xu S,et al.Key-Insulated Public-Key Cryptosystems[C]∥Procedings of EUROCRYPT 2002.volume 2332 of LNCS,2002:65-82 [4] Bellare M,Palacio.Protecting against key exposure:Stronglykey-insulated encryption with optimal threshold [EB/OL].[2002]http://eprint.iacr.org/2002/064 [5] Hanaoka,Imai.Parallel key-insulated public key encryption[C]∥Procedings of the PKC 2006.volume 3958 of LNCS,2006:105-122 [6] Katz D,Xu Yung.Strong key-insulated signature schemes [C]∥Procedings of the PKC 2003.volume 2567 of LNCS,2003:130-144 [7] Le Z,Ouyang Y,Ford J,et al.hierarchical key-insulated signature scheme in the CA trust model [M]∥Information Security and Cryptology.Springer,2006 [8] Zhou Y,Cao Z,Chai Z.Identity based key insulated signature [C]∥Procedings of the ISPEC 2006.volume 3903 of LNCS,2006:226-234 [9] Sahai A,Waters B.Fuzzy Identity Based Encryption [C]∥Proceedings of EUROCRYPT 2005.volume 3494 of LNCS,2005:457-473 |
No related articles found! |
|