DOI: 10.1007/978-3-540-79263-5_13
|View full text |Cite
|
Sign up to set email alerts
|

Identity-Based Threshold Key-Insulated Encryption without Random Oracles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
21
0

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(21 citation statements)
references
References 31 publications
0
21
0
Order By: Relevance
“…However, frequent updating of the temporary private key will also put the helper key in a higher risk [2] proposed a parallel key-insulated encryption scheme where distinct independent helpers are alternatively used in key update operations. In CT-RSA 2008, Weng et al [3] extended Dodis et al's key-insulation paradigm and gave an identity based threshold key-insulated encryption (IBTKIE) scheme [3] . For a (k, n) IBTKIE system [3] , at least k out of n helpers are needed to update the temporary private keys.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, frequent updating of the temporary private key will also put the helper key in a higher risk [2] proposed a parallel key-insulated encryption scheme where distinct independent helpers are alternatively used in key update operations. In CT-RSA 2008, Weng et al [3] extended Dodis et al's key-insulation paradigm and gave an identity based threshold key-insulated encryption (IBTKIE) scheme [3] . For a (k, n) IBTKIE system [3] , at least k out of n helpers are needed to update the temporary private keys.…”
Section: Introductionmentioning
confidence: 99%
“…In CT-RSA 2008, Weng et al [3] extended Dodis et al's key-insulation paradigm and gave an identity based threshold key-insulated encryption (IBTKIE) scheme [3] . For a (k, n) IBTKIE system [3] , at least k out of n helpers are needed to update the temporary private keys. The key-insulated signature scheme and the parallel key-insulated signature scheme are first proposed by Dodis et al [4] and Weng et al [5] respectively.…”
Section: Introductionmentioning
confidence: 99%
“…This strategy is similar to those for cryptosystems against key exposure such as key-insulated PKE [16,6,27] and IBE [22,21,40,41], forward secure encryption [12], and intrusion-resilient PKE [15]. However, these systems require a secure channel between a user and a key issuer or do not support scalability.…”
Section: Introductionmentioning
confidence: 99%
“…The two helpers are adopted alternatively to assist with the short-term private key update procedure. In 2008, Weng et al [21] further came up with an identity-based (k, n) threshold KIE scheme in which n helpers are adopted. When a user attempts to update his short-term private key, at least k helpers are sufficient to perform the key-update procedure while less than or equal to k − 1 cannot.…”
Section: Introductionmentioning
confidence: 99%