A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Public-key cryptosystems provably secure against chosen ciphertext attacks
STOC '90 Proceedings of the twenty-second annual ACM symposium on Theory of computing
An identity-based key-exchange protocol
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
How to withstand mobile virus attacks (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
Authentication and authenticated key exchanges
Designs, Codes and Cryptography
Adaptively secure multi-party computation
STOC '96 Proceedings of the twenty-eighth annual ACM symposium on Theory of computing
Proactive public key and signature systems
Proceedings of the 4th ACM conference on Computer and communications security
Simple forward-secure signatures from any signature scheme
Proceedings of the 7th ACM conference on Computer and communications security
Communications of the ACM
The Design and Analysis of Computer Algorithms
The Design and Analysis of Computer Algorithms
SIAM Journal on Computing
Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Relations Among Notions of Security for Public-Key Encryption Schemes
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Toward Hierarchical Identity-Based Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Hierarchical ID-Based Cryptography
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
Non-Malleable Non-Interactive Zero Knowledge and Adaptive Chosen-Ciphertext Security
FOCS '99 Proceedings of the 40th Annual Symposium on Foundations of Computer Science
Forward-secure signatures with fast key update
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
On the performance, feasibility, and use of forward-secure signatures
Proceedings of the 10th ACM conference on Computer and communications security
Proceedings of the 11th ACM conference on Computer and communications security
Direct chosen ciphertext security from identity-based techniques
Proceedings of the 12th ACM conference on Computer and communications security
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
Forward-secure signatures with untrusted update
Proceedings of the 13th ACM conference on Computer and communications security
Provably-secure time-bound hierarchical key assignment schemes
Proceedings of the 13th ACM conference on Computer and communications security
New constructions of fuzzy identity-based encryption
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
How to construct secure proxy cryptosystem
Information Sciences: an International Journal
Chosen-ciphertext secure proxy re-encryption
Proceedings of the 14th ACM conference on Computer and communications security
Attribute-based encryption with non-monotonic access structures
Proceedings of the 14th ACM conference on Computer and communications security
Forward-secure signatures in untrusted update environments: efficient and generic constructions
Proceedings of the 14th ACM conference on Computer and communications security
A tapestry of identity-based encryption: practical frameworks compared
International Journal of Applied Cryptography
A New Practical Limited Identity-Based Encryption Scheme
Fundamenta Informaticae
Stateful identity-based encryption scheme: faster encryption and decryption
Proceedings of the 2008 ACM symposium on Information, computer and communications security
On the security of group communication schemes
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
A content-driven access control system
Proceedings of the 7th symposium on Identity and trust on the Internet
Improved certificate-based encryption in the standard model
Journal of Systems and Software
Mobile device protection from loss and capture
Proceedings of the 1st international conference on PErvasive Technologies Related to Assistive Environments
Batch Verification of Short Signatures
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Multi-Identity Single-Key Decryption without Random Oracles
Information Security and Cryptology
Delegating Capabilities in Predicate Encryption Systems
ICALP '08 Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II
Bounded Ciphertext Policy Attribute Based Encryption
ICALP '08 Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II
Modeling Computational Security in Long-Lived Systems
CONCUR '08 Proceedings of the 19th international conference on Concurrency Theory
A new framework for the design and analysis of identity-based identification schemes
Theoretical Computer Science
Identity-based encryption with efficient revocation
Proceedings of the 15th ACM conference on Computer and communications security
Black-box accountable authority identity-based encryption
Proceedings of the 15th ACM conference on Computer and communications security
Efficient and Provably Secure Certificateless Multi-receiver Signcryption
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
Secure Hierarchical Identity Based Encryption Scheme in the Standard Model
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
New Construction of Short Hierarchical ID-Based Signature in the Standard Model
Fundamenta Informaticae
Efficient Identity-Based Encryption with Tight Security Reduction
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Universally Composable Identity-Based Encryption
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Hierarchical Identity Based Encryption with Polynomially Many Levels
TCC '09 Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography
Predicate Privacy in Encryption Systems
TCC '09 Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption
Information Security and Cryptology --- ICISC 2008
Verifiable Random Functions from Identity-Based Key Encapsulation
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Adaptive-ID Secure Revocable Identity-Based Encryption
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Key Insulation and Intrusion Resilience over a Public Channel
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Key Evolution Systems in Untrusted Update Environments
Information Security and Cryptology
Strong mobile device protection from loss and capture
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Forward-Secure Group Signatures from Pairings
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Certificateless signcryption scheme in the standard model
Information Sciences: an International Journal
Spatial Encryption under Simpler Assumption
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
Efficient hybrid encryption from ID-based encryption
Designs, Codes and Cryptography
Dynamic fully forward-secure group signatures
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Identity-based encryption based on DHIES
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Parallel key-insulated public key encryption without random oracles
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Intrusion-resilient key exchange in the bounded retrieval model
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Multi-authority attribute based encryption
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Certificate-based encryption and the certificate revocation problem
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Reducing trust in the PKG in identity based cryptosystems
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Formal security treatments for signatures from identity-based encryption
ProvSec'07 Proceedings of the 1st international conference on Provable security
Identity-based broadcast encryption with constant size ciphertexts and private keys
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Preventing unofficial information propagation
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Predicate encryption supporting disjunctions, polynomial equations, and inner products
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
Attribute-based encryption with partially hidden encryptor-specified access structures
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Identity-based threshold key-insulated encryption without random oracles
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Certificateless encryption schemes strongly secure in the standard model
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Vanish: increasing data privacy with self-destructing data
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Practical leakage-resilient identity-based encryption from simple assumptions
Proceedings of the 17th ACM conference on Computer and communications security
MPSS: Mobile Proactive Secret Sharing
ACM Transactions on Information and System Security (TISSEC)
Key Evolution Systems in Untrusted Update Environments
ACM Transactions on Information and System Security (TISSEC)
Efficient chosen-ciphertext security via extractable hash proofs
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
Generic constructions of parallel key-insulated encryption
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Forward-secure identity-based signature: Security notions and construction
Information Sciences: an International Journal
How to construct interval encryption from binary tree encryption
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Securing communication of dynamic groups in dynamic network-centric environments
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Keeping data secret under full compromise using porter devices
Proceedings of the 26th Annual Computer Security Applications Conference
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Generic constructions for chosen-ciphertext secure attribute based encryption
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Expressive key-policy attribute-based encryption with constant-size ciphertexts
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Achieving leakage resilience through dual system encryption
TCC'11 Proceedings of the 8th conference on Theory of cryptography
Identity-based encryption secure against selective opening attack
TCC'11 Proceedings of the 8th conference on Theory of cryptography
Functional encryption: definitions and challenges
TCC'11 Proceedings of the 8th conference on Theory of cryptography
Unbounded HIBE and attribute-based encryption
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Decentralizing attribute-based encryption
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Public-key encryptions tolerating adaptive and composable adversaries
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Fully secure cipertext-policy hiding CP-ABE
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
New fully secure hierarchical identity-based encryption with constant size ciphertexts
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Fully non-interactive onion routing with forward-secrecy
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Privacy-friendly aggregation for the smart-grid
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Time-lock puzzles in the random oracle model
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
Forward secure ring signature without random oracles
ICICS'11 Proceedings of the 13th international conference on Information and communications security
A variant of Boyen-waters anonymous IBE scheme
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Forward-Secure and searchable broadcast encryption with short ciphertexts and private keys
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Efficient intrusion-resilient signatures without random oracles
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
On pairing-based cryptosystems
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Universally composable identity-based encryption
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Reducing the spread of damage of key exposures in key-insulated encryption
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Intrusion-resilient identity-based signature: Security definition and construction
Journal of Systems and Software
Identity-Based hierarchical strongly key-insulated encryption and its application
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Cryptography based on bilinear maps
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Applying fujisaki-okamoto to identity-based encryption
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Forward secure password-enabled PKI with instant revocation
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Constructing secure proxy cryptosystem
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Chosen ciphertext secure public key threshold encryption without random oracles
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
New techniques for dual system encryption and fully secure HIBE with short ciphertexts
TCC'10 Proceedings of the 7th international conference on Theory of Cryptography
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Attribute-based encryption schemes with constant-size ciphertexts
Theoretical Computer Science
Identity based encryption without redundancy
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Improved efficiency for CCA-secure cryptosystems built using identity-based encryption
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Adaptively-secure, non-interactive public-key encryption
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Compulsion resistant anonymous communications
IH'05 Proceedings of the 7th international conference on Information Hiding
A formal treatment of onion routing
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Efficient identity-based encryption without random oracles
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Hierarchical identity based encryption with constant size ciphertext
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Time-based release of confidential information in hierarchical settings
ISC'05 Proceedings of the 8th international conference on Information Security
Efficient and non-interactive timed-release encryption
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Secure key-updating for lazy revocation
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
Lattice mixing and vanishing trapdoors: a framework for fully secure short signatures and more
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Anonymous hierarchical identity-based encryption (without random oracles)
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Parallel key-insulated public key encryption
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Generalization of the Selective-ID security model for HIBE protocols
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
On constructing certificateless cryptosystems from identity based encryption
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Practical identity-based encryption without random oracles
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Efficient and provably secure multi-receiver identity-based signcryption
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
ID-Based ring signature scheme secure in the standard model
IWSEC'06 Proceedings of the 1st international conference on Security
New constructions of constant size ciphertext HIBE without random oracle
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Efficient identity-based encryption with tight security reduction
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Authenticated group key agreement for multicast
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Anonymity from asymmetry: new constructions for anonymous HIBE
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Security proof of sakai-kasahara's identity-based encryption scheme
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Intrusion-Resilience via the bounded-storage model
TCC'06 Proceedings of the Third conference on Theory of Cryptography
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Yet another forward secure signature from bilinear pairings
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Fully forward-secure group signatures
Cryptography and Security
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
A novel commutative blinding identity based encryption scheme
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
Computing on authenticated data
TCC'12 Proceedings of the 9th international conference on Theory of Cryptography
Bounded-Collusion IBE from key homomorphism
TCC'12 Proceedings of the 9th international conference on Theory of Cryptography
Identity-Based (lossy) trapdoor functions and applications
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Tools for simulating features of composite order bilinear groups in the prime order setting
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Property preserving symmetric encryption
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Scalable group signatures with revocation
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Computer Networks: The International Journal of Computer and Telecommunications Networking
From selective to full security: semi-generic transformations in the standard model
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model
Fundamenta Informaticae
Forward-Secure Identity-Based Public-Key Encryption without Random Oracles
Fundamenta Informaticae
New Construction of Short Hierarchical ID-Based Signature in the Standard Model
Fundamenta Informaticae
Fully secure unidirectional identity-based proxy re-encryption
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
A New Practical Limited Identity-Based Encryption Scheme
Fundamenta Informaticae
Improved anonymous timed-release encryption
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Practical time capsule signatures in the standard model from bilinear maps
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Certificateless public key encryption in the selective-ID security model
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Proxy re-encryption systems for identity-based encryption
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Identity-based encryption: how to decrypt multiple ciphertexts using a single decryption key
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Direct chosen-ciphertext secure hierarchical ID-based encryption schemes
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Combined public-key schemes: the case of ABE and ABS
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Time-Specific encryption from forward-secure encryption
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
Adaptively secure forward-secure non-interactive threshold cryptosystems
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
A forward-secure certificate-based signature scheme in the standard model
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Dual form signatures: an approach for proving security from static assumptions
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Fully secure hidden vector encryption under standard assumptions
Information Sciences: an International Journal
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Proxy re-encryption in a stronger security model extended from CT-RSA2012
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
The k-BDH assumption family: bilinear map cryptography from progressively weaker assumptions
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Adaptively secure non-interactive threshold cryptosystems
Theoretical Computer Science
Forward-Secure hierarchical predicate encryption
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Shorter IBE and signatures via asymmetric pairings
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Ciphertext policy multi-dimensional range encryption
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
On the conventional public key in identification-based encryption: the case of RSA
International Journal of Information and Computer Security
On the security of two multi-use CCA-secure proxy re-encryption schemes
International Journal of Intelligent Information and Database Systems
Efficient identity-based encryption without pairings and key escrow for mobile devices
WASA'13 Proceedings of the 8th international conference on Wireless Algorithms, Systems, and Applications
Towards a cryptographic treatment of publish/subscribe systems
Journal of Computer Security
Hi-index | 0.00 |
Cryptographic computations are often carried out on insecure devices for which the threat of key exposure represents a serious and realistic concern. In an effort to mitigate the damage caused by exposure of secret data (e.g., keys) stored on such devices, the paradigm of forward security was introduced. In a forward-secure scheme, secret keys are updated at regular periods of time; furthermore, exposure of a secret key corresponding to a given time period does not enable an adversary to "break" the scheme (in the appropriate sense) for any prior time period. A number of constructions of forward-secure digital signature schemes, key-exchange protocols, and symmetric-key schemes are known. We present the first constructions of a (non-interactive) forward-secure public-key encryption scheme. Our main construction achieves security against chosen plaintext attacks under the decisional bilinear Diffie-Hellman assumption in the standard model. It is practical, and all complexity parameters grow at most logarithmically with the total number of time periods. The scheme can also be extended to achieve security against chosen ciphertext attacks.