key-insulated相关论文
...
...
...
In proxy signature schemes, the proxy signer B is permitted to produce a signature on behalf of the original signer A. H......
The basic idea behind an ID-based cryptosystem is that end user’s public key can be determined by his identity informat......
In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. Ho......
本文通过分析密钥绝缘体制和多级代理签名体制性质,发现他们之间存在某些本质上的一致性,构造了一种新的多级代理签名体制.在这个......
Without the assumption that the private keys are kept secure perfectly, cryptographic primitives cannot be deployed in t......
给出基于二元哈希树的密钥隔离代理签名方案,该方案可以降低了移动代理滥用攻击和密钥泄漏产生的危害。通过分析,该方案的代理签名......
自Dodis提出密钥绝缘的概念后,基于各种数学难题的密钥绝缘签名体制层出不穷,2004年密码年会上发表的论文“一个完备的强密钥绝缘签......
如何应对基于身份的签名系统中密钥泄漏的问题,是一项非常有意义的工作.为了处理这一问题,利用Dodis等人的密钥隔离机制,提出了一种基......
针对基于身份的聚合签名系统中密钥泄漏的问题,给出了基于身份的密钥隔离聚合签名的概念,同时提出具体的基于身份的密钥隔离聚合签名......
The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity infor......
Parallel key-insulation allows the use of multiple helper keys to protect private decryption keys during secret decrypti......