Article ID Journal Published Year Pages File Type
4944099 Information Sciences 2018 13 Pages PDF
Abstract
In this work, we review the folklore generic constructions of identity-based signature and certificateless signature schemes, and show that if the underlying primitives are leakage-resilient, so are the resulting identity-based signature scheme and certificateless signature scheme. The leakage rate follows the minimum one of the underlying primitives. To demonstrate, we show some instantiations of these generic constructions.
Related Topics
Physical Sciences and Engineering Computer Science Artificial Intelligence
Authors
, ,