• Publications
  • Influence
Parallel Key-Insulated Public Key Encryption
Security is constantly been infringed by inadvertent loss of secret keys, and as a solution, Dodis, Katz, Xu, and Yung [11], in Eurocrypt 2002, proposed a new paradigm called key-insulated securityExpand
  • 58
  • 5
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). In practice, key revocation is a necessary and inevitable process and IBE is no exceptionExpand
  • 84
  • 4
Unconditionally Secure Anonymous Encryption and Group Authentication
Anonymous channels or similar techniques that achieve sender's anonymity play important roles in many applications, e.g. electronic voting. However, they will be meaningless if cryptographicExpand
  • 32
  • 3
Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions
Computer systems are constantly under attack and illegal access is a constant threat which makes security even more critical. A system can be broken into and secret information, e.g. decryption key,Expand
  • 15
Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication
A chaffing-and-winnowing is a cryptographic scheme which does not require encryption but instead use a message authentication code (MAC) to provide the same function as encryption. In this paper, weExpand
  • 6
Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption
A proposal for key exposure resilient cryptography called, key-insulated public key encryption (KIPE), has been proposed by Dodis, Katz, Xu, and Yung [6] in which the secret key is changed over timeExpand
  • 6
Information-theoretically Secure Key insulated encryption: Models, bounds and constructions
Computer systems are constantly under attack and illegal access is a constant threat which makes security even more critical. A system can be broken into and secret information, e.g. decryption key,Expand
  • 3
Unconditionally Secure Anonymous Encryption and Group Authentication
Anonymous channels or similar techniques that can achieve sender's anonymity play important roles in many applications. However, they will be meaningless if cryptographic primitives containing hisExpand
  • 1
Identity-Based Encryption with Non-Interactive Key Update
In this paper, we discuss non-interactive updating of private keys in identity-based encryption (IBE). IBE is a public key cryptosystem where a public key is an arbitrary string. Key revocation inExpand
  • 1