[1] Anderson R. Invited Lecture[C]//Proceedings of Fourth Annual Conference on Computer and Communication Security. New York: ACM Press, 1997: 1-7.
[2] Bellare M, Miner S K. A Forward-secure Digital Signature Scheme[C]//Advances in Cryptography-CRYPTO'99. Berlin: Springer-Verlag, 1999: 431-448.
[3] Anderson R. Two Remarks on Public-key Cryptology[R]. UCAM-CL-TR-549. Cambridge: University of Cambridge, 2000.
[4] Abdalla M, Reyzin L. A New Forward-secure Digital Signature Scheme[C]//6th International Conference on the Theory and Application of Cryptology and Infromation Security. Berlin: Springer-Verlag, 2000: 116-129.
[5] Back A. Non-interactive Forward Secrecy[Z]. Posting to Cypherpunks Mailing List, 1996.
[6] Canetti R, Halevi S, Katz J. A Forward-secure Public-key Encryption Scheme[J]. Journal of Cryptology, 2007, 20: 265-294.
[7] Kozlov A, Reyzin L. Forward-secure Signatures with Fast Key Update[C]//International Conference on Security in Communication Networks. Berlin: Springer-Verlag, 2011: 241-256.
[8] Krawczyk H. Simple Forward-secure Signatures from Any Signature Scheme[C]//Proceedings of the Seventh ACM Conference on Computer and Communication Security. Piscataway: Association for Computing Machine, 2000.
[9] Malkin T, Micciancio D, Miner S. Efficient Generic Forward-secure Signatures with an Unbounded Number of Time Periods[C]//Advances in Cryptology-Eurocrypt: 2332. Berlin: Springer-Verlag, 2002: 400-417.
[10] Lin D T, Wang C I, Guan D J. A Forward-Backward Secure Signature Scheme[J]. Journal of Information Science and Engineering, 2010, 26(6): 2319-2329.
[11] Sakumoto K, Shirai T, Hivatari H. Sony Corporation:Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials[C]//CRYPTO2011. Heidelberg: Springer-Verlag, 2011: 706-723.
[12] Garey M, Johnson D. Computers and Intractability, a Guide to the Theory of NP-completeness[M]. New York: Freeman, 1979: 128-130.
[13] Patarin J, Goubin J. Trapdoor One-way Permutations and Multivariate Polynomials[C]//Proceedings of ICISC 1997. Berlin: Springer Verlag, 1997: 356-368.
[14] Gene I. Forward Security Adaptive Crytography: Time Evolution[R]. National Science Foundation under Grant No.0311485. Boston: Computer Science Department, Boston University, 2004.
[15] Hastad J, Impagliazzo R, Levin L. Construction of Pseudo-random Generator from Any One-way Function[J]. SIAM Journal on Computing, 1993, 28(4): 1364-1396.
[16] Krawczyk H. Simple Forward-secure Signatures from Any Signature Scheme[C]//Seventh ACM Conference on Computer and Communication Security. Piscataway: Association for Computing Machine, 2000: 108-115.
[17] Bouillaguet C, Chen H C, Cheng C M, et al. Fast Exhaustive Search for Polynomial Systems in F2[C]//International workshop on Cryptographic Hardware and Embeded Systems. Heidelberg: Springer, 2011: 203-218.
[18] Goldreich O. Foundations of Cryptography: Volume I. Basic Tools[M]. Cambridge: Cambridge University Press, 2001.
[19] Addalla M, An J H, Bellare M, et al. From Identification to Signatures via the Fiat-Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security[J]. IEEE Transactions on Information Theory, 2008, 54(8): 3631-3646.
[20] Itkis G, Reyzin J. Forward-secure Signatures with Optimal Signing and Verifying[C]//Proceedings of CRYPTO, LNCS 2139. Heidelberg: Springer, 2001: 332-354.
[21] 李成, 何明星. 一个前向和后向安全的数字签名方案[J]. 武汉大学学报(理学版), 2008, (5): 557-560.
Li Cheng, He Mingxing. A Forward Secure and Backward Secure Signature Scheme[J]. Journal of Wuhan University(Natural Science Edition), 2008, (5): 557-560.
[22] 邱钢, 王宏, 肖鸿, 等. 两个前向安全盲签名体制的安全性分析[J]. 西安电子科技大学学报, 2010, 37(1): 107-112.
Qiu Gang, Wang Hong, Xiao Hong, et al. Security Analysis of Two Forward-secure Blind Signature Schemes[J]. Journal of Xidian University, 2010, 37(1): 107-112. |