Robust Key-Evolving Public Key Encryption Schemes
- 16 December 2002
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- Key-Insulated Public Key CryptosystemsLecture Notes in Computer Science, 2002
- Threshold cryptosystemsPublished by Springer Science and Business Media LLC ,2001
- A Threshold Cryptosystem without a Trusted PartyPublished by Springer Science and Business Media LLC ,2001
- A New Forward-Secure Digital Signature SchemeLecture Notes in Computer Science, 2000
- A Forward-Secure Digital Signature SchemeLecture Notes in Computer Science, 1999
- A practical public key cryptosystem provably secure against adaptive chosen ciphertext attackLecture Notes in Computer Science, 1998
- Proactive Secret Sharing Or: How to Cope With Perpetual LeakageLecture Notes in Computer Science, 1995
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993
- A practical scheme for non-interactive verifiable secret sharingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985