Pages that link to "Item:Q4414703"
From MaRDI portal
The following pages link to Strong Key-Insulated Signature Schemes (Q4414703):
Displaying 36 items.
- Identity-based key-insulated proxy signature without random oracles (Q407488) (← links)
- Certificateless strong key-insulated signature without random oracles (Q407492) (← links)
- One forward-secure signature scheme using bilinear maps and its applications (Q506297) (← links)
- Strong key-insulated signature in the standard model (Q615357) (← links)
- Certificateless key-insulated signature without random oracles (Q621463) (← links)
- Forward-secure identity-based signature: security notions and construction (Q621647) (← links)
- Attribute-based key-insulated signature and its applications (Q726546) (← links)
- Security proofs for identity-based identification and signature schemes (Q1027974) (← links)
- Key-insulated aggregate signature (Q1633053) (← links)
- Short identity-based signatures with tight security from lattices (Q2118556) (← links)
- Intrusion-resilient identity-based signatures: concrete scheme in the standard model and generic construction (Q2198024) (← links)
- Tight security for the generic construction of identity-based signature (in the multi-instance setting) (Q2210521) (← links)
- Identity-based encryption with hierarchical key-insulation in the standard model (Q2414931) (← links)
- A generic construction of tightly secure signatures in the multi-user setting (Q2419110) (← links)
- An efficient threshold key-insulated signature scheme (Q2440174) (← links)
- Identity-based ring signatures from RSA (Q2465630) (← links)
- Fine-grained forward-secure signature schemes without random oracles (Q2489913) (← links)
- Protecting against key-exposure: strongly key-insulated encryption with optimal threshold (Q2502164) (← links)
- An improved certificateless strong key-insulated signature scheme in the standard model (Q2516787) (← links)
- Tightly Secure Signatures and Public-Key Encryption (Q2914286) (← links)
- Leakage Resilient Strong Key-Insulated Signatures in Public Channel (Q3103599) (← links)
- An Efficient Strong Key-Insulated Signature Scheme and Its Application (Q3506354) (← links)
- Key Insulation and Intrusion Resilience over a Public Channel (Q3623037) (← links)
- Strong Anonymous Signatures (Q3623072) (← links)
- Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic Curves (Q5069714) (← links)
- Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures (Q5445450) (← links)
- Proxy Signatures Secure Against Proxy Key Exposure (Q5445451) (← links)
- Identity-Based Threshold Key-Insulated Encryption without Random Oracles (Q5458941) (← links)
- Information and Communications Security (Q5464813) (← links)
- Information Security and Privacy (Q5473569) (← links)
- Information Security (Q5492775) (← links)
- Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps (Q5505460) (← links)
- Secure Key-Updating for Lazy Revocation (Q5862525) (← links)
- Forward-secure encryption with fast forwarding (Q6114263) (← links)
- Shorter and faster identity-based signatures with tight security in the (Q)ROM from lattices (Q6535098) (← links)
- Agile cryptography: a universally composable approach (Q6587964) (← links)