IDENTITY-BASED FORWARD SECURE THRESHOLD SIGNATURE SCHEME BASED ON MEDIATED RSA

Jia Yu, Rong Hao, Fanyu Kong, Xiangguo Cheng, Huawei Zhao, and Yangkui Chen

References

  1. [1] A. Shamir, Identity-based cryptosystems and signature schemes, Proceedings of Cryptology-Crypto’84, California, USA, 1998, 47–53.
  2. [2] D. Boneh & M. Franklin, Identity based encryption from the Weil pairing, Proceedings of Cryptology-Crypto’01, California, USA, 2001, 213–229.
  3. [3] C. Cocks, An identity based encryption scheme based on quadratic residues, Proceedings of Cryptography and Coding’01, UK, 2001, 360–363.
  4. [4] C. Gentry & A. Silverberg, Hierarchical ID-based cryptography, Proceedings of Cryptology-Asiacrypt 2002, Queenstown, New Zealand, 2002, 548–566.
  5. [5] R. Anderson, Two remarks on public key cryptology, Invited Lecture, In 4th ACM Conference on Computer and Communications Security, Zurich, Switzerland, 1997.
  6. [6] M. Bellare & S. Miner, A forward-secure digital signature scheme, Proceedings ofCryptology-CRYPTO 1999, California, USA, 1999, 431–448.
  7. [7] M. Abdalla & L. Reyzin, A new forward-secure digital signature scheme, Proceedings of Cryptology-ASIACRYPT 2000, Kyoto, Japan, 2000, 116–129.
  8. [8] G. Itkis & L. Reyzin, Forward-secure signatures with optimal signing and verifying, Proceedings of Cryptology-CRYPTO 2001, California, USA, 2001, 499–514.
  9. [9] R. Canetti, S. Halevi, & J. Katz, A forward-secure public-key encryption scheme, Proceedings of Cryptology-EUROCRYPT 2003, Warsaw, Poland, 2003, 255–271.
  10. [10] G. Itkis & L. Reyzin, SiBIR: Signer-base intrusion-resilient signatures, Proceedings of Cryptology-CRYPTO 2002, California, USA, 2002, 499–514.
  11. [11] A. Kozlov & L. Reyzin, Forward-secure signatures with fast key update, Proceedings of Security in Communication Networks, Amalfi, Italy, 2002, 247–262.
  12. [12] H. Krawczyk, Simple forward-secure signatures for any signature scheme,Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, 2000, 108–115.
  13. [13] T. Maklin, D. Micciancio, & S. Miner, Efficient generic forwardsecure signatures with an unbounded number of time periods, Proceedings of Cryptology-EUROCRYPT 2002, Amsterdam, The Netherlands, 2002, 400–417.
  14. [14] V. Shoup, Practical threshold signatures, Proceedings of Cryptology-Eurocrypt 2000, Belgium, 2000, 207–220.
  15. [15] I. Damg˚ard & M. Koprowski, Practical threshold RSA signatures without a trusted dealer, Proceedings of CryptologyEurocrypt’01, Innsbruck, Austria, 2001, 152–165.
  16. [16] Y. Frankel, P. Gemmell, P. Machkenzie, & M. Yung, Proactive RSA, Proceedings of Crypto’97, California, USA, 1997, 440– 454.
  17. [17] R. Rabin, A simplified approach to threshold and proactive RSA, Proceedings of CRYPTO 1998, California, USA, 1998, 89–104.
  18. [18] D. Boneh, X. Ding, G. Tsudik, & B. Wong, Instantaneous revocation of security capabilities, Proceeding of USENIX Security Symposium 2001, Washington.
  19. [19] R. Ganesan, Augmenting kerberos with public-key cryptography, Proceedings of Symposium on Network and Distributed Systems Security, CA, USA, 1995, 132–143.
  20. [20] P. Mckenzie & M.K. Reiter, Networked cryptographic devices resilient to capture,Proceedings of the 2001 IEEE Symposium on Security and Privacy, CA, USA, 2001, 12–25.
  21. [21] D. Boneh, X. Ding, & G. Tsudik, Identity-based mediated RSA, Proceedings of 3rd International Workshop on Information and Security Applications, Jeju Island, Korea, 2002.
  22. [22] X. Ding & G. Tsudik, Simple identity-based encryption with mediated RSA, Proceedings of RSA Conference 2003, CA, USA, 2003, 193–210.
  23. [23] G. Tsudik, Weak forward security in mediated RSA, Proceedings of the Security in Communication Networks 2003, Amalfi, Italy, 2003, 45–54.
  24. [24] D. Chaum & T.P. Pedersen, Transferred cash grows in size, Proceedings of Cryptology-Eurocrypt’92, Bariloche, Argentina, 1992, 390–407.

Important Links:

Go Back