STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
How to withstand mobile virus attacks (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
CRYPTO '89 Proceedings on Advances in cryptology
Proactive public key and signature systems
Proceedings of the 4th ACM conference on Computer and communications security
On the generation of cryptographically strong pseudorandom sequences
ACM Transactions on Computer Systems (TOCS)
Signature schemes based on the strong RSA assumption
ACM Transactions on Information and System Security (TISSEC)
Delegation of cryptographic servers for capture-resilient devices
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Forward-Secure Threshold Signature Schemes
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
A Forward-Secure Digital Signature Scheme
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Forward-Secure Signatures with Optimal Signing and Verifying
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Key-Insulated Public Key Cryptosystems
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Can We Eliminate Certificate Revocations Lists?
FC '98 Proceedings of the Second International Conference on Financial Cryptography
Networked Cryptographic Devices Resilient to Capture
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Efficient Certificate Revocation
Efficient Certificate Revocation
Protocols for secure computations
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
Security proofs for signature schemes
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Collision-free accumulators and fail-stop signature schemes without trees
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Strong Key-Insulated Signature Schemes
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
On the performance, feasibility, and use of forward-secure signatures
Proceedings of the 10th ACM conference on Computer and communications security
Proceedings of the 10th ACM conference on Computer and communications security
Fine-grained forward-secure signature schemes without random oracles
Discrete Applied Mathematics - Special issue: Coding and cryptography
Forward-secure signatures with untrusted update
Proceedings of the 13th ACM conference on Computer and communications security
Forward-secure signatures in untrusted update environments: efficient and generic constructions
Proceedings of the 14th ACM conference on Computer and communications security
A survey of key evolving cryptosystems
International Journal of Security and Networks
Exploiting social networks for threshold signing: attack-resilience vs. availability
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Identity-Based Key-Insulated Signature Without Random Oracles
Computational Intelligence and Security
An Efficient Strong Key-Insulated Signature Scheme and Its Application
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
How to Protect Yourself without Perfect Shredding
ICALP '08 Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
DISH: Distributed Self-Healing
SSS '08 Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Collaborative authentication in unattended WSNs
Proceedings of the second ACM conference on Wireless network security
On the Theory and Practice of Personal Digital Signatures
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Key Insulation and Intrusion Resilience over a Public Channel
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Key Evolution Systems in Untrusted Update Environments
Information Security and Cryptology
Strong mobile device protection from loss and capture
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles
Journal of Systems and Software
Fine-grained forward-secure signature schemes without random oracles
Discrete Applied Mathematics - Special issue: Coding and cryptography
Dynamic fully forward-secure group signatures
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Parallel key-insulated public key encryption without random oracles
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Intrusion-resilient key exchange in the bounded retrieval model
TCC'07 Proceedings of the 4th conference on Theory of cryptography
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Secure applications of Pedersen's distributed key generation protocol
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
A scalable and secure cryptographic service
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Security of a leakage-resilient protocol for key establishment and mutual authentication
ProvSec'07 Proceedings of the 1st international conference on Provable security
Preventing unofficial information propagation
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Identity-based threshold key-insulated encryption without random oracles
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Key Evolution Systems in Untrusted Update Environments
ACM Transactions on Information and System Security (TISSEC)
Generic constructions of parallel key-insulated encryption
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Forward-secure identity-based signature: Security notions and construction
Information Sciences: an International Journal
Intrusion-resilient integrity in data-centric unattended WSNs
Pervasive and Mobile Computing
Identity-based key-insulated signature with secure key-updates
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Efficient intrusion-resilient signatures without random oracles
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Intrusion-resilient identity-based signature: Security definition and construction
Journal of Systems and Software
On the security of two key-updating signature schemes
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Secure key-updating for lazy revocation
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Information-theoretically secure key-insulated multireceiver authentication codes
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Parallel key-insulated public key encryption
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
A method for safekeeping cryptographic keys from memory disclosure attacks
INTRUST'09 Proceedings of the First international conference on Trusted Systems
Two-Head dragon protocol: preventing cloning of signature keys
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Intrusion-Resilience via the bounded-storage model
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Fully forward-secure group signatures
Cryptography and Security
Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Hi-index | 0.00 |
We propose a new notion of signer-base intrusion-resilient (SiBIR) signatures, which generalizes and improves upon both forward-secure [And97, BM99] and key-insulated [DKXY02] signature schemes.Specifically, as in the prior notions, time is divided into predefined time periods (e.g., days); each signature includes the number of the time period in which it was generated; while the public key remains the same, the secret keys evolve with time. Also, as in key-insulated schemes, the user has two modules, signer and home base: the signer generates signatures on his own, and the base is needed only to help update the signer's key from one period to the next.The main strength of intrusion-resilient schemes, as opposed to prior notions, is that they remain secure even after arbitrarily many compromises of both modules, as long as the compromises are not simultaneous. Moreover, even if the intruder does compromise both modules simultaneously, she will still be unable to generate any signatures for the previous time periods.We provide an efficient intrusion-resilient signature scheme, provably secure in the random oracle model based on the strong RSA assumption. We also discuss how such schemes can eliminate the need for certificate revocation in the case of on-line authentication.