Proceedings of CRYPTO 84 on Advances in cryptology
A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
How to withstand mobile virus attacks (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
Communication complexity of secure computation (extended abstract)
STOC '92 Proceedings of the twenty-fourth annual ACM symposium on Theory of computing
Authentication and authenticated key exchanges
Designs, Codes and Cryptography
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
How to share a function securely
STOC '94 Proceedings of the twenty-sixth annual ACM symposium on Theory of computing
Simple forward-secure signatures from any signature scheme
Proceedings of the 7th ACM conference on Computer and communications security
Communications of the ACM
A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication
ACISP '00 Proceedings of the 5th Australasian Conference on Information Security and Privacy
Secure Key-Evolving Protocols for Discrete Logarithm Schemes
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures
CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications
On the Security Properties of OAEP as an All-or-Nothing Transform
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Coding Constructions for Blacklisting Problems without Computational Assumptions
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
A Forward-Secure Digital Signature Scheme
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Forward-Secure Signatures with Optimal Signing and Verifying
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
A New Forward-Secure Digital Signature Scheme
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
All-or-Nothing Encryption and the Package Transform
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Efficient Methods for Integrating Traceability and Broadcast Encryption
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
A Concrete Security Treatment of Symmetric Encryption
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Adaptively secure threshold cryptography: introducing concurrency, removing erasures
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Exposure-resilient functions and all-or-nothing transforms
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Robust Key-Evolving Public Key Encryption Schemes
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Strong Key-Insulated Signature Schemes
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
SiBIR: Signer-Base Intrusion-Resilient Signatures
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
On the performance, feasibility, and use of forward-secure signatures
Proceedings of the 10th ACM conference on Computer and communications security
Proceedings of the 10th ACM conference on Computer and communications security
Provable Cryptographic Security and its Applications to Mobile Wireless Computing
Wireless Personal Communications: An International Journal
Improved proxy re-encryption schemes with applications to secure distributed storage
ACM Transactions on Information and System Security (TISSEC)
Scalable public-key tracing and revoking
Distributed Computing
Forward-secure signatures with untrusted update
Proceedings of the 13th ACM conference on Computer and communications security
Forward-secure signatures in untrusted update environments: efficient and generic constructions
Proceedings of the 14th ACM conference on Computer and communications security
Provably Secure Timed-Release Public Key Encryption
ACM Transactions on Information and System Security (TISSEC)
A survey of key evolving cryptosystems
International Journal of Security and Networks
Mobile device protection from loss and capture
Proceedings of the 1st international conference on PErvasive Technologies Related to Assistive Environments
Identity-Based Key-Insulated Signature Without Random Oracles
Computational Intelligence and Security
An Efficient Strong Key-Insulated Signature Scheme and Its Application
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
A New Approach to Secure Logging
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
DISH: Distributed Self-Healing
SSS '08 Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems
A new approach to secure logging
ACM Transactions on Storage (TOS)
Collaborative authentication in unattended WSNs
Proceedings of the second ACM conference on Wireless network security
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Extension of Broadcasting Service by Using Electronic Tokens
IEICE - Transactions on Information and Systems
On the Theory and Practice of Personal Digital Signatures
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Key Insulation and Intrusion Resilience over a Public Channel
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Key Evolution Systems in Untrusted Update Environments
Information Security and Cryptology
Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Strong mobile device protection from loss and capture
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles
Journal of Systems and Software
Dynamic fully forward-secure group signatures
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Separating encryption and key issuance in digital rights management systems
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Parallel key-insulated public key encryption without random oracles
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Intrusion-resilient key exchange in the bounded retrieval model
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Certificate-based encryption and the certificate revocation problem
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Rethinking chosen-ciphertext security under Kerckhoffs'assumption
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Provably secure public-key encryption for length-preserving chaumian mixes
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Protecting against key escrow and key exposure in identity-based cryptosystem
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
Bounded CCA2-secure encryption
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Identity-based threshold key-insulated encryption without random oracles
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
User-friendly grid security architecture and protocols
Proceedings of the 13th international conference on Security protocols
Intrusion-resilience in mobile unattended WSNs
INFOCOM'10 Proceedings of the 29th conference on Information communications
Vanish: increasing data privacy with self-destructing data
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Key Evolution Systems in Untrusted Update Environments
ACM Transactions on Information and System Security (TISSEC)
Security of sequential multiple encryption
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
Generic constructions of parallel key-insulated encryption
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme
Journal of Systems and Software
Adversarial security: getting to the root of the problem
iNetSec'10 Proceedings of the 2010 IFIP WG 11.4 international conference on Open research problems in network security
Intrusion-resilient integrity in data-centric unattended WSNs
Pervasive and Mobile Computing
New identity-based key-insulated convertible multi-authenticated encryption scheme
Journal of Network and Computer Applications
Password-protected secret sharing
Proceedings of the 18th ACM conference on Computer and communications security
Identity-based key-insulated signature with secure key-updates
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Efficient intrusion-resilient signatures without random oracles
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Reducing the spread of damage of key exposures in key-insulated encryption
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Identity-Based hierarchical strongly key-insulated encryption and its application
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
On the security of two key-updating signature schemes
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
A PKI system for detecting the exposure of a user’s secret key
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
A strong identity based key-insulated cryptosystem
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Identity based key insulated signature
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Chosen-ciphertext security of multiple encryption
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Separable implicit certificate revocation
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Secure key-updating for lazy revocation
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Timed-release and key-insulated public key encryption
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Information-theoretically secure key-insulated multireceiver authentication codes
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Parallel key-insulated public key encryption
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Adaptively secure traitor tracing against key exposure and its application to anywhere TV service
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
A new proxy signature scheme providing self-delegation
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
A method for safekeeping cryptographic keys from memory disclosure attacks
INTRUST'09 Proceedings of the First international conference on Trusted Systems
SocialClouds: concept, security architecture and some mechanisms
INTRUST'09 Proceedings of the First international conference on Trusted Systems
Leakage resilient strong key-insulated signatures in public channel
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Short signatures from weaker assumptions
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Fully forward-secure group signatures
Cryptography and Security
CT-RSA'12 Proceedings of the 12th conference on Topics in Cryptology
Bounded-Collusion IBE from key homomorphism
TCC'12 Proceedings of the 9th international conference on Theory of Cryptography
ACM Transactions on Information and System Security (TISSEC)
Data security in unattended wireless sensor networks with mobile sinks
Wireless Communications & Mobile Computing
Forward-Secure Identity-Based Public-Key Encryption without Random Oracles
Fundamenta Informaticae
Self-healing in unattended wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Secure and efficient public key management in next generation mobile networks
Personal and Ubiquitous Computing
A secure and private RFID authentication protocol under SLPN problem
NSS'12 Proceedings of the 6th international conference on Network and System Security
Efficient delegation of key generation and revocation functionalities in identity-based encryption
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Group signatures with message-dependent opening
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Hi-index | 0.01 |
Cryptographic computations (decryption, signature generation, etc.) are often performed on a relatively insecure device (e.g., a mobile device or an Internet-connected host) which cannot be trusted to maintain secrecy of the private key. We propose and investigate the notion of key-insulated security whose goal is to minimize the damage caused by secret-key exposures. In our model, the secret key(s) stored on the insecure device are refreshed at discrete time periods via interaction with a physically-secure - but computationally-limited - device which stores a "master key". All cryptographic computations are still done on the insecure device, and the public key remains unchanged. In a (t, N)-key-insulated scheme, an adversary who compromises the insecure device and obtains secret keys for up to t periods of his choice is unable to violate the security of the cryptosystem for any of the remaining N-t periods. Furthermore, the scheme remains secure (for all time periods) against an adversary who compromises only the physically-secure device. We focus primarily on key-insulated public-key encryption. We construct a (t, N)-key-insulated encryption scheme based on any (standard) publickey encryption scheme, and give a more efficient construction based on the DDH assumption. The latter construction is then extended to achieve chosen-ciphertext security.