Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete key-insulated encryption (KIE) schemes in which secret keys are periodically updated by using a physically ``insulated\u27\u27 helper key. For significantly reducing possibility of exposure of the helper key, Hanaoka et al. further proposed the notion of parallel KIE (PKIE) in which multiple helper keys are used in alternate shifts. They also pointed out that in contrast to the case of the standard KIE, PKIE cannot be straightforwardly obtained from identity-based encryption (IBE). In this paper, we first discuss that previous security models for PKIE are somewhat we...
24-28Many cryptographic schemes were designed under the assumption that the private keys involved in...
In public key encryption (PKE), anonymity is essential to ensure privacy by preventing the ciphertex...
Abstract. We propose generic constructions of public-key encryption schemes, satisfying key- depende...
Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the sec...
Abstract. Key-insulated cryptography is a crucial technique for pro-tecting private keys. To strengt...
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strength...
To minimize the damage caused by key-exposure in ID-based signatures, in ISPEC’06 Zhou et al (2006) ...
To minimize the damage caused by key-exposure in ID-based signatures, in ISPEC’06 Zhou et al (2006) ...
In this paper we investigate the topic of integrated public-key encryption (PKE) and public-key encr...
Recently, Döttling and Garg (CRYPTO 2017) showed how to build identity-based encryption (IBE) from a...
To deal with the problem of secret key exposure, Dodis, Katz, Xu and Yung proposed a key-insulated p...
Public key encryption (PKE) is a fundamental cryptographic primitive with which we can communicate s...
To deal with the problem of secret key exposure, Dodis, Katz, Xu and Yung proposed a key-insulated p...
Hierarchical key-insulated identity-based encryption (HKIBE) is identity-based encryption (IBE) that...
Public key encryption (PKE) is a fundamental cryptographic primitive with which we can communicate s...
24-28Many cryptographic schemes were designed under the assumption that the private keys involved in...
In public key encryption (PKE), anonymity is essential to ensure privacy by preventing the ciphertex...
Abstract. We propose generic constructions of public-key encryption schemes, satisfying key- depende...
Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the sec...
Abstract. Key-insulated cryptography is a crucial technique for pro-tecting private keys. To strengt...
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strength...
To minimize the damage caused by key-exposure in ID-based signatures, in ISPEC’06 Zhou et al (2006) ...
To minimize the damage caused by key-exposure in ID-based signatures, in ISPEC’06 Zhou et al (2006) ...
In this paper we investigate the topic of integrated public-key encryption (PKE) and public-key encr...
Recently, Döttling and Garg (CRYPTO 2017) showed how to build identity-based encryption (IBE) from a...
To deal with the problem of secret key exposure, Dodis, Katz, Xu and Yung proposed a key-insulated p...
Public key encryption (PKE) is a fundamental cryptographic primitive with which we can communicate s...
To deal with the problem of secret key exposure, Dodis, Katz, Xu and Yung proposed a key-insulated p...
Hierarchical key-insulated identity-based encryption (HKIBE) is identity-based encryption (IBE) that...
Public key encryption (PKE) is a fundamental cryptographic primitive with which we can communicate s...
24-28Many cryptographic schemes were designed under the assumption that the private keys involved in...
In public key encryption (PKE), anonymity is essential to ensure privacy by preventing the ciphertex...
Abstract. We propose generic constructions of public-key encryption schemes, satisfying key- depende...