1 Shamir A. Identity-based cryptosystems and signature schemes [C]// Advances in Cryptology-Crypto 1984. Berlin: Springer-Verlag, 1984: 47-53.2 Al-Riyami S S, Paterson K G. Certificateless public key cryptography [C] // Proceedings of 9th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology-Asiacrypt 2003. Berlin: Springer-Verlag, 2003: 452-473.3 Dodis Y, Katz J, Xu S, et al. Key-insulated public-key cryptosystems [C]// Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology-Eurocrypt'2002. Berlin: Springer-Verlag, 2002: 65-82.4 Dodis Y, Katz J, Xu S, et al. Strong key-insulated signature schemes [C]// Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography. Berlin: Springer-Verlag, 2003: 130-144.5 Dodis Y, Yung M. Exposure-resilience for free: The hierarchical ID-based encryption case [C]// Proceedings of the First International IEEE Security in Storage Workshop. Washington, DC, USA: IEEE, 2002: 45-52.6 Hanaoka G, Hanaoka Y, Imai H. Parallel key-insulated public key encryption [C]// Proceedings of the 9th International Conference on Practice and Theory in Public Key Cryptograph: Public Key Cryptography. Berlin: Springer-Verlag, 2006: 105-122.7 Hanaoka Y, Hanaoka G, Shikata J, et al. Unconditionally secure key-insulated cryptosystems: models, bounds and constructions [C]// Proceedings of the 4th International Conference on Information and Communications Security. Berlin: Springer-Verlag, 2002: 85-96.8 Le Z, Ouyang Y, Ford J, et al. A hierarchical key-insulated signature scheme in the CA trust model[C]// Proceedings of 7th International Conference on Information Security. Berlin: Springer-Verlag, 2004: 280-291.9 Weng J, Chen K F, Liu S L, et al. Identity-based key-insulated signature with secure key-updates [C]// Proceedings of the 6th China International Conference on Information Security and Cryptology. Berlin: Springer-Verlag, 2006: 13-26.10 Weng J, Chen K F, Liu S L, et al. Identity-based strong key-insulated signature without random oracles [J]. Jounal of Software , 2008, 19(6): 1555-1564.11 Zhou Y, Cao Z F, Chai Z C. Identity-based key insulated signature [C]// Proceedings of Second International Conference on Information Security Practice and Experience. Berlin: Springer-Verlag, 2006: 226-234.12 Bellare M, Palacio A. Protecting against key exposure: strongly key-insulated encryption with optimal threshold [J]. Applicable Algebra in Engineering, Communication and Computing, 2006, 16(6): 379-396.13 Canetti R, Goldreich O, Halevi S. The random oracle methodology, revisited [J]. Journal of the ACM, 2004, 51(4): 557-594.14 Xiong H, Qin Z, Li F. An improved certificateless signature scheme secure in the standard model [J]. Fundamenta Informaticae, 2008, 88(1): 1-14. |