Leakage-resilient group signature: Definitions and constructions
Tài liệu tham khảo
Akavia, 2009, Simultaneous hardcore bits and cryptography against memory attacks, 474
Alwen, 2009, Leakage-resilient public-key cryptography in the bounded-retrieval model, 36
Ateniese, 2000, A practical and provably secure coalition-resistant group signature scheme, 255
Ateniese, 2000, A practical and provably secure coalition-resistant group signature scheme, 255
Ateniese, 2002, Efficient group signatures without trapdoors, Cryptol. Eprint Arch., 2002, 173
Ateniese, 2002, Quasi-efficient revocation of group signatures, 183
Ateniese, 1999, Group signatures á la carte, 848
Bellare, 2003, Foundations of group signatures: formal definitions, simplified requirements, and a construction based on general assumptions, 614
Bellare, 1999, A forward-secure digital signature scheme, 431
Boneh, 2004, Short group signatures, 41
Boneh, 1997, On the importance of checking cryptographic protocols for faults, 37
Boyle, 2013, Fully leakage-resilient signatures, J. Cryptol., 26, 513, 10.1007/s00145-012-9136-3
Brakerski, 2010, Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage, 501
Bresson, 2001, Efficient revocation in group signatures, 190
Camenisch, 1997, Efficient group signature schemes for large groups, 410
Chaum, 1991, Group signatures, 257
Chen, 1994, New group signature schemes
Coron, 1999, Resistance against differential power analysis for elliptic curve cryptosystems, 292
De Santis, 2001, Robust non-interactive zero knowledge, 566
Dodis, 2010, Efficient public-key cryptography in the presence of key leakage, 613
Dziembowski, 2008, Leakage-resilient cryptography, 293
Faust, 2016, Signature schemes secure against hard-to-invert leakage, J. Cryptol., 29, 422, 10.1007/s00145-015-9197-1
Gandolfi, 2001, Electromagnetic analysis: concrete results, 251
Goldwasser, 1988, A digital signature scheme secure against adaptive chosen-message attacks, SIAM J. Comput., 17, 281, 10.1137/0217017
Halderman, 2009, Lest we remember: cold-boot attacks on encryption keys, Commun. ACM, 52, 91, 10.1145/1506409.1506429
Huang, 2018, Black-box constructions of signature schemes in the bounded leakage setting, Inf. Sci., 423, 313, 10.1016/j.ins.2017.09.055
Huang, 2016, A black-box construction of strongly unforgeable signature schemes in the bounded leakage model, 320
Huang, 2017, A black-box construction of strongly unforgeable signature scheme in the leakage setting, Int. J. Found. Comput. Sci., 28, 761, 10.1142/S0129054117400172
Huang, 2018, Leakage-resilient dual-form signatures, Comput. J., 10.1093/comjnl/bxy059
Kalai, 2011, Cryptography with tamperable and leaky memory, 373
Katz, 2009, Signature schemes with bounded leakage resilience, 703
Kiayias, 2003, Extracting group signatures from traitor tracing schemes
Kocher, 1999, Differential power analysis, 388
Kocher, 1996, Timing attacks on implementations of Diffie–Hellman, rsa, dss, and other systems, 104
Micali, 2004, Physically observable cryptography, 278
Ono, 2017, On randomness exposure resilience of group signatures, IEICE Trans. Inf. Syst., 100, 2357, 10.1587/transinf.2016INP0015
Quisquater, 2001, Electromagnetic analysis (EMA): measures and counter-measures for smart cards, 200
C. Ramsay, TEMPEST attacks against AES Covertly stealing keys for €200, 2017.
Sahai, 1999, Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security, 543
Shamir, 1984, Identity-based cryptosystems and signature schemes, 47
Wang, 2014, A provably secure ring signature scheme with bounded leakage resilience, 388
Wang, 2016, Generic transformations for existentially unforgeable signature schemes in the bounded leakage model, Secur. Commun. Netw., 9, 1829, 10.1002/sec.1436
Yuen, 2012, Fully leakage-resilient signatures with auxiliary inputs, 294