Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the security of key-insulated protocols, Hanaoka, Hanaoka and Imai recently introduced the idea of parallel key-insulated encryption (PKIE) where distinct physically-secure devices (called helpers) are independently used in key updates. Their motivation was to reduce the risk of exposure for helpers by decreasing the frequency of their connections to insecure environments. Hanaoka et al. showed that it was non-trivial to achieve a PKIE scheme fitting their model and proposed a construction based on the Boneh-Franklin identity-based encryption (IBE) scheme. The security of their system was only analyzed in the idealized random oracle model. In this p...
Public Key Cryptosystem (PKC) completely relies under the assumption that user’s private key is abso...
To deal with the problem of secret key exposure, Dodis, Katz, Xu and Yung proposed a key-insulated p...
Abstract. An important research area in the past decade is to search for efficient cryptographic sch...
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strength...
Abstract. Key-insulated cryptography is a crucial technique for pro-tecting private keys. To strengt...
Exposure of a secret key is a significant threat in practice. As a notion of security against key ex...
[[abstract]]Recently, the notion of the key-insulated public- key system has been suggested to prote...
To minimize the damage caused by key-exposure in ID-based signatures, in ISPEC’06 Zhou et al (2006) ...
24-28Many cryptographic schemes were designed under the assumption that the private keys involved in...
AbstractPrivate key exposure can be the most devastating attack on cryptographic schemes; as such ex...
Abstract. A parallel authentication and public-key encryption is introduced and ex-empli ed on joint...
A parallel authentication and public-key encryption is introduced and exemplified on joint encryptio...
This work develops earlier ideas of Certificateless Public Key Encryption (CL-PKE) (posted on IACR e...
Abstract.We introduce the notion of distributed password-based public-key cryptography, where a virt...
To minimize the damage caused by key-exposure in ID-based signatures, in ISPEC’06 Zhou et al (2006) ...
Public Key Cryptosystem (PKC) completely relies under the assumption that user’s private key is abso...
To deal with the problem of secret key exposure, Dodis, Katz, Xu and Yung proposed a key-insulated p...
Abstract. An important research area in the past decade is to search for efficient cryptographic sch...
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strength...
Abstract. Key-insulated cryptography is a crucial technique for pro-tecting private keys. To strengt...
Exposure of a secret key is a significant threat in practice. As a notion of security against key ex...
[[abstract]]Recently, the notion of the key-insulated public- key system has been suggested to prote...
To minimize the damage caused by key-exposure in ID-based signatures, in ISPEC’06 Zhou et al (2006) ...
24-28Many cryptographic schemes were designed under the assumption that the private keys involved in...
AbstractPrivate key exposure can be the most devastating attack on cryptographic schemes; as such ex...
Abstract. A parallel authentication and public-key encryption is introduced and ex-empli ed on joint...
A parallel authentication and public-key encryption is introduced and exemplified on joint encryptio...
This work develops earlier ideas of Certificateless Public Key Encryption (CL-PKE) (posted on IACR e...
Abstract.We introduce the notion of distributed password-based public-key cryptography, where a virt...
To minimize the damage caused by key-exposure in ID-based signatures, in ISPEC’06 Zhou et al (2006) ...
Public Key Cryptosystem (PKC) completely relies under the assumption that user’s private key is abso...
To deal with the problem of secret key exposure, Dodis, Katz, Xu and Yung proposed a key-insulated p...
Abstract. An important research area in the past decade is to search for efficient cryptographic sch...