Forward-secure identity-based signature: security notions and construction

J Yu, R Hao, F Kong, X Cheng, J Fan, Y Chen - Information Sciences, 2011 - Elsevier
The security of traditional identity-based signatures wholly depends on the security of secret
keys. Exposure of secret keys requires reissuing all previously assigned signatures. This …

An efficient V2I authentication scheme for VANETs

Y Zhou, S Liu, M Xiao, S Deng… - Mobile Information …, 2018 - Wiley Online Library
The advent of intelligent transportation system has a crucial impact on the traffic safety and
efficiency. To cope with security issues such as spoofing attack and forgery attack, many …

Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT

H Hong, Z Sun - World Wide Web, 2018 - Springer
Attribute based proxy re-encryption (ABPRE) combines the merits of proxy re-encryption and
attribute based encryption, which allows a delegator to re-encrypt the ciphertext according to …

Forward-secure identity-based signature with efficient revocation

J Wei, W Liu, X Hu - International Journal of Computer Mathematics, 2017 - Taylor & Francis
The security of traditional identity-based signature (IBS) is totally built upon the assumption
that the private key is absolutely secure. However, with the increasing use of mobile and …

A bar code location algorithm using a two-dimensional approach

C Viard-Gaudin, N Normand… - Proceedings of 2nd …, 1993 - ieeexplore.ieee.org
Proposes a method for locating bar code blocks on parcels. One of the main difficulties
involved is the combination of the very poor quality and the potential high complexity of the …

Efficient ID-based key-insulated signature scheme with batch verifications using bilinear pairings over elliptic curves

P Gopal, PV Reddy - Journal of Discrete Mathematical Sciences …, 2015 - Taylor & Francis
Exposure of private keys in cryptographic schemes leads to breakage of security of the
scheme as a whole. To avoid the damage caused by key exposure problem, in this paper …

[HTML][HTML] Efficient and secure identity-based strong key-insulated signature scheme without pairings

PV Reddy, AR Babu, NB Gayathri - … of King Saud University-Computer and …, 2021 - Elsevier
Abstract Public Key Cryptosystem (PKC) completely relies under the assumption that user's
private key is absolutely secure. Exposure of private key may lead to disastrous situations in …

[PDF][PDF] ID-based key-insulated signature scheme with batch verifications and its novel application

TY Wu, YM Tseng, CW Yu - International Journal of Innovative …, 2012 - academia.edu
For a digital signature scheme, loss of private keys will cause a devastating effect on e-
commerce and Internet-based transaction applications in the present network environment …

Identity-based key-insulated signcryption

J Chen, K Chen, Y Wang, X Li, Y Long, Z Wan - Informatica, 2012 - content.iospress.com
Key-insulated cryptography is an important technique to protect private keys in identitybased
(IB) cryptosytems. Despite the flurry of recent results on IB key-insulated encryption (IBKIE) …

Certificate-based key-insulated signature in the standard model

J Li, H Du, Y Zhang - The Computer Journal, 2016 - academic.oup.com
The key-insulated signature scheme provides a good method to solve key exposure
problem. The key-insulated mechanism has been extended to the identity-based …