[1] |
DIFFIE W , HELLMAN M . New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976,22(6): 644-654.
|
[2] |
ANDERSON R , . Two Remarks on Public Key Cryptology[R]. Invited Lecture at the 4th ACM Conference on Computer and Communications Security, 1997.
|
[3] |
GüNTHER C G . An identity-based key-exchange protocol[A]. Proc of the Eurocrypt 1989[C]. Heidelberg: Springer-Verlag, 1990. 29-37.
|
[4] |
DIFFIE W , VAN-OORSCHOT P C , WEINER M J . Authentication and authenticated key exchanges[J]. Designs, Codes and Cryptography, 1992,2(2): 107-125.
|
[5] |
BELLARE M , MINER S K . A forward-secure digital signature scheme[A]. Proc of the Crypto 1999[C]. Heidelberg: Springer-Verlag, 1999. 431-448.
|
[6] |
KRAWCZYK H . Simple forward-secure signatures from any signature scheme[A]. Proc of 7th ACM Conference on Computer and Communications Security[C]. New York, USA, 2000. 108-115.
|
[7] |
ABDALLA M , REYZIN L . A new forward-secure digital signature scheme[A]. Proc of the Asiacrypt 2000[C]. Heidelberg: Springer-Verlag, 2000. 116-129.
|
[8] |
ABDALLA M , MINER S K , NAMPREMPRE C . Forward-secure threshold signature schemes[A]. Proc of the CT-RSA 2001[C]. Heidelberg: Springer-Verlag, 2001. 441-456.
|
[9] |
ITKIS G , REYZIN L . Forward-secure signatures with optimal signing and verifying[A]. Proc of the Crypto 2001[C]. Heidelberg: Springer-Verlag, 2001. 499-514.
|
[10] |
KOZLOV A , REYZIN L . Forward-secure signatures with fast key update[A]. Proc of the SCN 2002[C]. Heidelberg: Springer-Verlag, 2002. 247-262.
|
[11] |
MALKIN T , MICCIANCIO D , MINER S K . Efficient generic for-ward-secure signatures with an unbounded number of time periods[A]. Proc of the Eurocrypt 2002[C]. Heidelberg: Springer-Verlag, 2002. 400-417.
|
[12] |
BOYEN X , SHACHAM H , SHEN E et al. Forward-secure signatures with untrusted update[J]. Proc of 13th ACM Conference on Computer and Communications Security[C]. New York, USA, 2006. 191-200.
|
[13] |
LIBERT B , QUISQUATER J , YUNG M . Forward-secure signatures in untrusted update environments[A]. Proc of the 14th ACM Conference on Computer and Communications Security[C]. New York, USA, 2007. 266-275.
|
[14] |
YU J , KONG F Y , CHENG X G et al. Construction of yet another forward-secure signature scheme suing bilinear maps[A]. Proc of the 2nd International Conference on Provable Security[C]. Heidelberg: Springer-Verlag, 2008. 83-97.
|
[15] |
CANETTI R , HALEVI S , KATZ J . A forward-secure public-key encryption scheme[A]. Proc of the Eurocrypt 2003[C]. Heidelberg: Springer-Verlag, 2003. 255-271.
|
[16] |
GENTRY C , SILVERBERG A . Hierarchical ID-based cryptography[A]. Proc of the Asiacrypt 2002[C]. Heidelberg: Springer-Verlag, 2002. 548-566.
|
[17] |
CANETTI R , HALEVI S , KATZ J . A forward-secure public-key encryption scheme[J]. Journal of Cryptology, 2007,20: 265-294.
|
[18] |
JIANG H , XU Q L , HOU M B . Forward-secure public-key encryption scheme with tamper evidence[A]. Proc of the 2007 International Conference on Computational Intelligence and Security Workshops[C]. IEEE Press, 2007. 656-659.
|
[19] |
李成邦, 胡珂流, 许春香 . 一种构造前向安全公钥加密算法的一般方法[J]. 信息安全与通信保密, 2009,8: 313-315. LI C B , HU K L , XU C X . Forward-secure public cryptosystem based on a simple public cryptosystem[J]. China Information Security, 2009,8: 313-315.
|
[20] |
LU Y , LI J G . A practical forward-secure public-key encryption scheme[J]. Journal of Networks, 2011,6(9): 1254-1261.
|
[21] |
BONEH D , BOYEN X , GOH E J . Hierarchical identity based encryption with constant size ciphertext[A]. Proc of the Eurocrypt 2005[C]. Heidelberg: Springer-Verlag, 2005. 440-456.
|
[22] |
YAO D , FAZIO N , DODIS Y et al. ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption[A]. Proc of the 11th ACM Conference on Computer and Communications Security[C]. New York: ACM Press, USA, 2004. 354-363.
|
[23] |
YU J , KONG F Y , CHENG X G et al. Forward-secure identity-based public-key encryption without random oracles[J]. Fundamenta Informaticae, 2011,111(2): 241-256.
|
[24] |
杨浩淼, 孙世新, 李洪伟 . 前向安全的基于身份加密方案[J]. 电子科技大学学报, 2007,36(3): 534-537. YANG H M , SUN S X , LI H W . Forward-secure identity-based encryption scheme[J]. Journal of University of Electronic Science and Technology of China, 2007,36(3): 534-537.
|
[25] |
LU Y , LI J G . Forward-secure certificate-based encryption and its generic construction[J]. Journal of Networks, 2010,5(5): 527-534.
|
[26] |
RACKOFF C , SIMON D . Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack[A]. Proc of the Crypto 1991[C]. Heidelberg: Springer-Verlag, 1991. 433-444.
|
[27] |
GENTRY C . Practical identity-based encryption without random oracles[A]. Proc of the Eurocrypt 2006[C]. Heidelberg: Springer-Verlag, 2006. 445-464.
|
[28] |
LIU J K , ZHOU J Y . Efficient certificate-based encryption in the standard model[A]. Proc of the 6th International Conference on Security and Cryptography for Networks[C]. Heidelberg: Springer-Verlag, 2008. 144-155.
|