{"id":"https://openalex.org/W2095489005","doi":"https://doi.org/10.1145/1880022.1880031","title":"Key Evolution Systems in Untrusted Update Environments","display_name":"Key Evolution Systems in Untrusted Update Environments","publication_year":2010,"publication_date":"2010-12-01","ids":{"openalex":"https://openalex.org/W2095489005","doi":"https://doi.org/10.1145/1880022.1880031","mag":"2095489005"},"language":"en","primary_location":{"id":"doi:10.1145/1880022.1880031","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1880022.1880031","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048787826","display_name":"Ben\u00f4\u0131t Libert","orcid":null},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Beno\u00eet Libert","raw_affiliation_strings":["Universit\u00e9 Catholique de Louvain, Crypto Group"],"affiliations":[{"raw_affiliation_string":"Universit\u00e9 Catholique de Louvain, Crypto Group","institution_ids":["https://openalex.org/I95674353"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108457109","display_name":"Jean-Jacques Quisquater","orcid":null},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Jean-Jacques Quisquater","raw_affiliation_strings":["Universit\u00e9 Catholique de Louvain, Crypto Group"],"affiliations":[{"raw_affiliation_string":"Universit\u00e9 Catholique de Louvain, Crypto Group","institution_ids":["https://openalex.org/I95674353"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030243906","display_name":"Moti Yung","orcid":"https://orcid.org/0000-0003-0848-0873"},"institutions":[{"id":"https://openalex.org/I1291425158","display_name":"Google (United States)","ror":"https://ror.org/00njsd438","country_code":"US","type":"company","lineage":["https://openalex.org/I1291425158","https://openalex.org/I4210128969"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Moti Yung","raw_affiliation_strings":["Google Inc. and Columbia University"],"affiliations":[{"raw_affiliation_string":"Google Inc. and Columbia University","institution_ids":["https://openalex.org/I1291425158"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5048787826"],"corresponding_institution_ids":["https://openalex.org/I95674353"],"apc_list":null,"apc_paid":null,"fwci":1.3531,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.84759743,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"13","issue":"4","first_page":"1","last_page":"34"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8369379639625549},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.7813522815704346},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6659324169158936},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6358755826950073},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5787081718444824},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5636706948280334},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5012123584747314},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.4921407103538513},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.45826297998428345},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4537345767021179},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.43858325481414795},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07148998975753784}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8369379639625549},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.7813522815704346},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6659324169158936},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6358755826950073},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5787081718444824},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5636706948280334},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5012123584747314},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.4921407103538513},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.45826297998428345},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4537345767021179},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.43858325481414795},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07148998975753784},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1880022.1880031","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1880022.1880031","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},{"id":"pmh:oai:dial.uclouvain.be:boreal:91620","is_oa":false,"landing_page_url":"http://hdl.handle.net/2078.1/91620","pdf_url":null,"source":{"id":"https://openalex.org/S4306400166","display_name":"Digital Access to Libraries","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2800384882","host_organization_name":"Harris County Public Library","host_organization_lineage":["https://openalex.org/I2800384882"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ACM Transactions on Information and System Security (TISSEC), Vol. 13, no. 4, p. article 37 (December 2010)","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":57,"referenced_works":["https://openalex.org/W104938420","https://openalex.org/W119875988","https://openalex.org/W200023587","https://openalex.org/W1481068248","https://openalex.org/W1498063506","https://openalex.org/W1500493851","https://openalex.org/W1505202270","https://openalex.org/W1505884345","https://openalex.org/W1514470655","https://openalex.org/W1525451859","https://openalex.org/W1532140623","https://openalex.org/W1538349060","https://openalex.org/W1551969482","https://openalex.org/W1561407045","https://openalex.org/W1576892942","https://openalex.org/W1579435243","https://openalex.org/W1585977625","https://openalex.org/W1587391206","https://openalex.org/W1589034595","https://openalex.org/W1592092778","https://openalex.org/W1600255172","https://openalex.org/W1603068992","https://openalex.org/W1606008692","https://openalex.org/W1610688607","https://openalex.org/W1911825786","https://openalex.org/W1928401044","https://openalex.org/W1972792640","https://openalex.org/W1980471700","https://openalex.org/W1998473519","https://openalex.org/W2011550196","https://openalex.org/W2013151455","https://openalex.org/W2032997303","https://openalex.org/W2052267638","https://openalex.org/W2074594718","https://openalex.org/W2085733527","https://openalex.org/W2104326461","https://openalex.org/W2106885798","https://openalex.org/W2116556172","https://openalex.org/W2117685508","https://openalex.org/W2129876196","https://openalex.org/W2132022887","https://openalex.org/W2134651419","https://openalex.org/W2145255308","https://openalex.org/W2148828749","https://openalex.org/W2151237029","https://openalex.org/W2151413173","https://openalex.org/W2164736940","https://openalex.org/W2166462813","https://openalex.org/W2167882086","https://openalex.org/W2170017018","https://openalex.org/W2224364690","https://openalex.org/W2232070551","https://openalex.org/W2398420747","https://openalex.org/W2561675875","https://openalex.org/W2912876874","https://openalex.org/W4232485878","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2376300043","https://openalex.org/W1599829249","https://openalex.org/W2521075147","https://openalex.org/W3161853141","https://openalex.org/W2351124668","https://openalex.org/W1832414306","https://openalex.org/W4281399468","https://openalex.org/W1595429840","https://openalex.org/W2095489005","https://openalex.org/W2942023969"],"abstract_inverted_index":{"Forward-Secure":[0],"Signatures":[1],"(FSS)":[2],"prevent":[3],"forgeries":[4],"for":[5,85],"past":[6],"time":[7,92,187],"periods":[8,188],"when":[9],"an":[10,171],"attacker":[11],"obtains":[12],"full":[13],"access":[14],"to":[15,159,179,200],"the":[16,21,30,45,114,120,126,134,143,155,166,184,196],"signer\u2019s":[17],"storage":[18],"by":[19,59,102,169],"evolving":[20],"private":[22,54],"key":[23,190,208],"in":[24,125],"a":[25,60,65,149,181],"one-way":[26],"fashion.":[27],"To":[28],"simplify":[29],"integration":[31,121],"of":[32,47,75,122,136,186],"these":[33],"primitives":[34,203],"into":[35,83],"standard":[36],"security":[37],"architectures,":[38],"Boyen":[39,103],"et":[40,104],"al.":[41,105],"[2006]":[42],"recently":[43],"introduced":[44],"concept":[46],"forward-secure":[48,128,206],"signatures":[49],"with":[50,142],"untrusted":[51,123],"updates":[52,68,124],"where":[53],"keys":[55,77],"are":[56],"additionally":[57],"protected":[58],"second":[61,145,151],"factor":[62,146],"(derived":[63],"from":[64],"password).":[66],"Key":[67],"can":[69,157],"be":[70],"made":[71],"on":[72,107,183],"encrypted":[73],"version":[74],"signing":[76,86],"so":[78],"that":[79,175],"passwords":[80],"only":[81],"come":[82],"play":[84],"messages":[87],"and":[88,110,148,210],"not":[89,96,112,177],"at":[90,189],"update":[91,94,198],"(since":[93],"is":[95,153],"user-driven).":[97],"The":[98,192],"scheme":[99],"put":[100],"forth":[101],"relies":[106],"bilinear":[108],"maps":[109],"does":[111,176],"require":[113,178],"random":[115],"oracle.":[116],"They":[117],"also":[118],"suggest":[119],"Bellare-Miner":[127],"signature.":[129],"Their":[130],"work":[131],"left":[132],"open":[133],"problem":[135,168],"endowing":[137],"other":[138,160,201],"existing":[139],"FSS":[140],"systems":[141],"same":[144],"protection,":[147],"natural":[150],"question":[152],"whether":[154],"method":[156],"apply":[158],"key-evolving":[161,202],"paradigms.":[162],"This":[163],"article":[164,193],"solves":[165],"first":[167],"showing":[170],"efficient":[172],"generic":[173],"construction":[174],"set":[180],"bound":[182],"number":[185],"generation.":[191],"then":[194],"extends":[195],"unprotected":[197],"model":[199],"such":[204],"as":[205],"public":[207],"encryption":[209],"key-insulated":[211],"cryptosystems.":[212]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
