Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
4944099 | Information Sciences | 2018 | 13 Pages |
Abstract
In this work, we review the folklore generic constructions of identity-based signature and certificateless signature schemes, and show that if the underlying primitives are leakage-resilient, so are the resulting identity-based signature scheme and certificateless signature scheme. The leakage rate follows the minimum one of the underlying primitives. To demonstrate, we show some instantiations of these generic constructions.
Related Topics
Physical Sciences and Engineering
Computer Science
Artificial Intelligence
Authors
Jianye Huang, Qiong Huang,