On the generic construction of identity-based signatures with additional properties

D Galindo, J Herranz, E Kiltz - … 2006: 12th International Conference on the …, 2006 - Springer
It has been demonstrated by Bellare, Neven, and Namprempre (Eurocrypt 2004) that identity-
based signature schemes can be constructed from any PKI-based signature scheme. In this …

Forward-secure identity-based signature: security notions and construction

J Yu, R Hao, F Kong, X Cheng, J Fan, Y Chen - Information Sciences, 2011 - Elsevier
The security of traditional identity-based signatures wholly depends on the security of secret
keys. Exposure of secret keys requires reissuing all previously assigned signatures. This …

Secure storage auditing with efficient key updates for cognitive industrial IoT environment

W Zheng, CF Lai, D He, N Kumar… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cognitive computing over big data brings more development opportunities for enterprises
and organizations in industrial informatics, and can make better decisions for them when …

An efficient V2I authentication scheme for VANETs

Y Zhou, S Liu, M Xiao, S Deng… - Mobile Information …, 2018 - Wiley Online Library
The advent of intelligent transportation system has a crucial impact on the traffic safety and
efficiency. To cope with security issues such as spoofing attack and forgery attack, many …

Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction

J Yu, R Hao, H Xia, H Zhang, X Cheng, F Kong - Information Sciences, 2018 - Elsevier
Key exposure problem is a very serious problem for identity-based signatures. Once the
secret key is exposed in identity-based signatures, all signatures generated from this secret …

Forward-secure identity-based signature with efficient revocation

J Wei, W Liu, X Hu - International Journal of Computer Mathematics, 2017 - Taylor & Francis
The security of traditional identity-based signature (IBS) is totally built upon the assumption
that the private key is absolutely secure. However, with the increasing use of mobile and …

[HTML][HTML] Identity-based key-insulated aggregate signature scheme

PV Reddy, P Gopal - Journal of King Saud University-Computer and …, 2017 - Elsevier
Private key exposure can be the most devastating attack on cryptographic schemes; as such
exposure leads to the breakage of security of the scheme as a whole. In the real world …

Efficient ID-based key-insulated signature scheme with batch verifications using bilinear pairings over elliptic curves

P Gopal, PV Reddy - Journal of Discrete Mathematical Sciences …, 2015 - Taylor & Francis
Exposure of private keys in cryptographic schemes leads to breakage of security of the
scheme as a whole. To avoid the damage caused by key exposure problem, in this paper …

[PDF][PDF] Identity-Based Parallel Key-Insulated Signature Without Random Oracles.

J Weng, X Li, K Chen, S Liu - J. Inf. Sci. Eng., 2008 - researchgate.net
We extend Hanaoka et al.'s parallel key-insulated mechanism to identity-based signature
scenarios, and propose an identity-based parallel key-insulated signature scheme. The …

[HTML][HTML] Efficient and secure identity-based strong key-insulated signature scheme without pairings

PV Reddy, AR Babu, NB Gayathri - … of King Saud University-Computer and …, 2021 - Elsevier
Abstract Public Key Cryptosystem (PKC) completely relies under the assumption that user's
private key is absolutely secure. Exposure of private key may lead to disastrous situations in …