1 |
D.Boneh, X.Di ng, G. Tsudik, and C.M.W ong. 'A method for fast revocation of public key certificates and security capabilities.' In 10th USENIX Security Symposium, Washington, D.C. , Aug. 2001
|
2 |
D. Boneh and M. Franklin. 'Identity Based Encryption From the Weil Pairing,' In Advances in Cryptology-Proceedings of Crypto '01, volume 2139 of Lecture Notes in Computer Science, pages 213-229. Springer, 2001
DOI
|
3 |
H. Yoon, J. H. Cheon, and Y. Kim. 'Batch verifications with ID-based signatures.' In Information Security and Cryptology - ICISC 2004, pp. 233 - 248, 2005
DOI
|
4 |
Gene Itkis and Leonid Reyzin. 'Intrusion-resilient signatures, or towards obsoletion of certificate revocation,' In Moti Yung, editor, Advances in CryptologylCRYPTO 2002, Lecture Notes in Computer Science. Springer-Verlag, 18-22 August 2002
|
5 |
G. Tsudik, 'Weak Forward Security in Mediated RSA,' Security in Computer Networks Conference (SCN'02), September 2002
DOI
|
6 |
A. Boldyreva. 'Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme.' In Proceedings of PKC03, Lecture Notes in Computer Science. Springer, 2003
DOI
|
7 |
M. Bellare and A. Palacio, 'Protecting against key exposure: strong keyinsulated encryption with optimal threshold,' Cryptology ePrint archive 2002/064, http://eprint.iacr.org/, 2002
|
8 |
Dae Hyun Yum and Pil Joong Lee, 'Efficient Key Updating Signature Schemes based on IBS,' Cryptography and Coding 2003, pp. 167-182, 2003
DOI
|
9 |
Noel McCullagh, 'Efficient Batch Verification of Signature Schemes based on Bilinear Maps,' Cryptology ePrint archive 2004/088, http://eprint.iacr.org/complete/,2004.9
|
10 |
B. Libert, J.-J. Quisquater, 'Efficient revocation and threshold pairing based cryptosystems,' Symposium on Principles of Distributed Computing-PODC'2003, 2003
DOI
|
11 |
R. Anderson, 'Invited lecture at the acm conference on computer and communication security (CCS'97),' 1997
|
12 |
J. Katz and M. Yung. 'Threshold Cryptosystems Based on Factoring.' In Advances in Cryptology - proceedings of Asiacrypt 2002, Lecture Notes in Computer Science. Springer, 2002
DOI
|
13 |
D. Boneh, B. Lynn, and H. Shacham. 'Short signatures from the Weil pairing.' In Advances in Cryptology-Proceedings of Asiaerypt'01. volume 2248 of Lecture Notes in Computer Science, pages 514-532. Springer, 2001
DOI
|
14 |
X. Ding and G. Tsudik. 'Simple Identity-Based Cryptography with Mediated RSA.' In Proceedings of CT-RSA '03, Lecture Notes in Computer Science. Springer, 2003
DOI
|
15 |
Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, and Moti Yung. 'Key-insulated public key cryptosysterns.' In Lars Knudsen, editor, Advances in Cryptology, EUROCRYPT 2002, Lecture Notes in Computer Science. Springer-Verlag, 28 April May 2002
|