Have a personal or library account? Click to login
Attribute-Based Parallel Key-Insulated Signature Cover
By:
Open Access
|Oct 2015

References

  1. 1. Chen, J., Y. Long, K. Chen, G. J. Hook. Attribute-Based Key-Insulated Signature and Its Applications. – Information Sciences, Vol. 275, 2014, pp. 57-67.10.1016/j.ins.2014.02.021
  2. 2. Dodis, Y., J. Katz, S. Xu, M. Yung. Key-Insulated Public-Key Cryptosystem. – In: Proc. of 21th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt), 28 April-2 May 2002.
  3. 3. Dodis, J. K., S. Xu, M. Yung. Key-Insulated Public-Key Cryptosystem. – In: Proc. of 9th International Conference on Theory and Practice in Public-Key Cryptography (PKC), 24-26 April 2006.
  4. 4. Li, J., K. Kim. Hidden Attribute-Based Signatures without Anonymity Revocation. – Information Sciences, Vol. 180, 2010, No 9, pp. 1681-1689.10.1016/j.ins.2010.01.008
  5. 5. Li, J., M. H. Au, W. Susilo, D. Xie, K. Ren. Attribute-Based Signature and Its Applications. – In: Proc. of 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 13-16 April 2010.10.1145/1755688.1755697
  6. 6. Libert, B., J. Quisquater, M. Young. Parallel Key-Insulated Public Key Encryption without Random Oracles. – In: Proc. of 10th International Conference on Theory and Practice in Public-Key Cryptography (PKC), 16-20 April 2007.
  7. 7. Shahandashti, S. F., R. Safavi-Naini. Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. – In: Proc. of 2rd International Conference on Cryptology in Africa (AFRICACRYPT), 21-25 June 2009.10.1007/978-3-642-02384-2_13
  8. 8. Weng, J., S. Liu, K. Chen, C. Ma. Identity-Based Parallel Key-Insulated Encryption without Random Oracles: Security Notions and Construction. – In: Proc. of 7th International Conference on Cryptology in India (INDOCRYPT), 11-16 December 2006.10.1007/11941378_29
  9. 9. Weng, S. J., S. Liu, K. Chen, X. Li. Identity-Based Parallel Key-Insulated Signature: Framework and Construction. – Journal of Research and Practice in Information Technology, Vol. 40, 2008, No 1, pp. 55-68.10.1007/s12204-008-0006-y
  10. 10. Weng, X. Li, K. Chen, S. Liu. Identity-Based Parallel Key-Insulated Signature without Random Oracles. – Journal of Information Science and Engineering, Vol. 24, 2008, No 4, pp. 1143-1157.
DOI: https://doi.org/10.1515/cait-2015-0039 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 26 - 40
Published on: Oct 5, 2015
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 times per year

© 2015 Jianhong Chen, Kun Yu, Yu Long, Kefei Chen, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.