The following pages link to (Q4737260):
Displaying 26 items.
- One forward-secure signature scheme using bilinear maps and its applications (Q506297) (← links)
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model (Q514535) (← links)
- Forward-secure identity-based signature: security notions and construction (Q621647) (← links)
- Attribute-based key-insulated signature and its applications (Q726546) (← links)
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions (Q1021236) (← links)
- On the tightness of forward-secure signature reductions (Q1715854) (← links)
- Asynchronous reconfiguration with Byzantine failures (Q2104034) (← links)
- Forward-secure ID based digital signature scheme with forward-secure private key generator (Q2195298) (← links)
- Intrusion-resilient identity-based signatures: concrete scheme in the standard model and generic construction (Q2198024) (← links)
- FAS: forward secure sequential aggregate signatures for secure logging (Q2200668) (← links)
- New methods and abstractions for RSA-based forward secure signatures (Q2229278) (← links)
- New forward-secure signature schemes with untrusted update (Q2418647) (← links)
- Fine-grained forward-secure signature schemes without random oracles (Q2489913) (← links)
- Protecting against key-exposure: strongly key-insulated encryption with optimal threshold (Q2502164) (← links)
- Updatable public key encryption in the standard model (Q2697895) (← links)
- A new forward-secure digital signature scheme (Q2707408) (← links)
- Compactness vs Collusion Resistance in Functional Encryption (Q3181036) (← links)
- How to Share a Secret, Infinitely (Q3181038) (← links)
- Tighter Reductions for Forward-Secure Signature Schemes (Q4916016) (← links)
- Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps (Q5505460) (← links)
- Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005 (Q5505467) (← links)
- Secure Key-Updating for Lazy Revocation (Q5862525) (← links)
- Permissionless and asynchronous asset transfer (Q6096037) (← links)
- Forward-secure encryption with fast forwarding (Q6114263) (← links)
- Asynchronous reconfiguration with Byzantine failures (Q6535026) (← links)
- Efficient updatable public-key encryption from lattices (Q6604934) (← links)