{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T12:57:27Z","timestamp":1765371447728,"version":"3.46.0"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032133007","type":"print"},{"value":"9783032133014","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T00:00:00Z","timestamp":1765411200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T00:00:00Z","timestamp":1765411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-13301-4_10","type":"book-chapter","created":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T09:12:38Z","timestamp":1765357958000},"page":"216-238","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Key-Updatable Identity-Based Signature Schemes"],"prefix":"10.1007","author":[{"given":"Tobias","family":"Guggemos","sequence":"first","affiliation":[]},{"given":"Farzin","family":"Renan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,11]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Whyte, W., Weimerskirch, A., Kumar, V., Hehn, T.: A security credential management system for V2V communications. In: 2013 IEEE Vehicular Networking Conference, pp. 1\u20138. IEEE (2013)","DOI":"10.1109\/VNC.2013.6737583"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Annual International Cryptology Conference, pp. 213\u2013229. Springer (2001)","DOI":"10.1007\/3-540-44647-8_13"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Boldyreva, A., Goyal, V., Kumar, V.: Identity-based encryption with efficient revocation. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 417\u2013426. ACM (2008)","DOI":"10.1145\/1455770.1455823"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Chen, J., Lim, H.W., Ling, S., Wang, H., Nguyen, K.: Revocable identity-based encryption from lattices. In: Australasian Conference on Information Security and Privacy, pp. 390\u2013403. Springer (2012)","DOI":"10.1007\/978-3-642-31448-3_29"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 548\u2013566. Springer (2002)","DOI":"10.1007\/3-540-36178-2_34"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 47\u201353. Springer (1984)","DOI":"10.1007\/3-540-39568-7_5"},{"key":"10_CR7","unstructured":"Au, M.H., Liu, J.K., Yuen, T.H., Wong, D.S.: Practical Hierarchical Identity Based Encryption and Signature Schemes Without Random Oracles. Cryptology ePrint Archive (2006)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Seo, J.H., Emura, K.: Revocable identity-based encryption revisited: security model and construction. In: International Workshop on Public Key Cryptography, pp. 216\u2013234. Springer (2013)","DOI":"10.1007\/978-3-642-36362-7_14"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Katz, J., Xu, S., Yung, M.: Strong key-insulated signature schemes. In: International Workshop on Public Key Cryptography, pp. 130\u2013144. Springer (2002)","DOI":"10.1007\/3-540-36288-6_10"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Lehmann, A., Tackmann, B.: Updatable encryption with post-compromise security. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 685\u2013716. Springer (2018)","DOI":"10.1007\/978-3-319-78372-7_22"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Galindo, D., Garcia, F.D.: A Schnorr-like lightweight identity-based signature scheme. In: International Conference on Cryptology in Africa, pp. 135\u2013148. Springer (2009)","DOI":"10.1007\/978-3-642-02384-2_9"},{"issue":"3","key":"10_CR12","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C-P Schnorr","year":"1991","unstructured":"Schnorr, C.-P.: Efficient signature generation by smart cards. J. Cryptol. 4(3), 161\u2013174 (1991)","journal-title":"J. Cryptol."},{"issue":"4","key":"10_CR13","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1016\/j.comcom.2007.10.017","volume":"31","author":"X Cao","year":"2008","unstructured":"Cao, X., Kou, W., Dang, L., Zhao, B.: IMBAS: identity-based multi-user broadcast authentication in wireless sensor networks. Comput. Commun. 31(4), 659\u2013667 (2008)","journal-title":"Comput. Commun."},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Hess, F.: Efficient identity based signature schemes based on pairings. In: International Workshop on Selected Areas in Cryptography, pp. 310\u2013324. Springer (2002)","DOI":"10.1007\/3-540-36492-7_20"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 515\u2013532. Springer (2005)","DOI":"10.1007\/11593447_28"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Beullens, W., Kleinjung, T., Vercauteren, F.: CSI-FiSh: efficient isogeny based signatures through class group computations. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 227\u2013247. Springer (2019)","DOI":"10.1007\/978-3-030-34578-5_9"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Shaw, S., Dutta, R.: Identification scheme and forward-secure signature in identity-based setting from isogenies. In: International Conference on Provable Security, pp. 309\u2013326. Springer (2021)","DOI":"10.1007\/978-3-030-90402-9_17"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Ohtake, G., Hanaoka, G., Ogawa, K.: An efficient strong key-insulated signature scheme and its application. In: European Public Key Infrastructure Workshop, pp. 150\u2013165. Springer (2008)","DOI":"10.1007\/978-3-540-69485-4_11"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Palombini, F., Tiloca, M.: RFC 9594: Key Provisioning for Group Communication Using Authentication and Authorization for Constrained Environments (ACE). RFC Editor (2024)","DOI":"10.17487\/RFC9594"},{"key":"10_CR20","unstructured":"Tiloca, M., Park, J., Palombini, F.: Key management for OSCORE groups in ACE. Internet-Draft draft-ietf-ace-key-groupcomm-oscore-02, Work in Progress (2019)"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., Polk, W.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280 (2008)","DOI":"10.17487\/rfc5280"},{"key":"10_CR22","unstructured":"Malpani, A., Galperin, S., Adams, C.: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol-OCSP. RFC 6960 (2013)"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Libert, B., Peters, T., Yung, M.: Scalable group signatures with revocation. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 609\u2013627. Springer (2012)","DOI":"10.1007\/978-3-642-29011-4_36"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Zhou, S., Lin, D.: Shorter verifier-local revocation group signatures from bilinear maps. In: International Conference on Cryptology and Network Security, pp. 126\u2013143. Springer (2006)","DOI":"10.1007\/11935070_8"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Felde, N.G., Grundner-Culemann, S., Guggemos, T.: Authentication in dynamic groups using identity-based signatures. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/WiMOB.2018.8589148"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Liu, Z., Lai, Y., Ren, X., Bu, S.: An efficient LKH tree balancing algorithm for group key management. In: 2012 International Conference on Control Engineering and Communication Technology, pp. 1003\u20131005. IEEE (2012)","DOI":"10.1109\/ICCECT.2012.213"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Silverman, J.H.: The Arithmetic of Elliptic Curves, vol. 106. Springer (2009)","DOI":"10.1007\/978-0-387-09494-6"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Baugher, M., Canetti, R., Dondeti, L., Lindholm, F.: Multicast Security (MSEC) Group Key Management Architecture. RFC 4046 (2005)","DOI":"10.17487\/rfc4046"},{"issue":"1","key":"10_CR29","first-page":"105","volume":"2","author":"Y Challal","year":"2005","unstructured":"Challal, Y., Seba, H.: Group key management protocols: a novel taxonomy. Int. J. Inf. Technol. 2(1), 105\u2013118 (2005)","journal-title":"Int. J. Inf. Technol."},{"key":"10_CR30","unstructured":"Smyslov, V., Weis, B.: Group Key Management using IKEv2. Internet-Draft draft-ietf-ipsecme-g-ikev2-23, Work in Progress (2025)"},{"issue":"1","key":"10_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00145-008-9028-8","volume":"22","author":"M Bellare","year":"2009","unstructured":"Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. J. Cryptol. 22(1), 1\u201361 (2009)","journal-title":"J. Cryptol."},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Bellare, M., Yee, B.: Forward-security in private-key cryptography. In: Cryptographers\u2019 Track at the RSA Conference, pp. 1\u201318. Springer (2003)","DOI":"10.1007\/3-540-36563-X_1"},{"key":"10_CR33","unstructured":"Itkis, G.: Forward security, adaptive cryptography: time evolution. In: Handbook of Information Security, vol. 3, pp. 927\u2013944. Wiley (2006)"},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Kim, Y., Perrig, A., Tsudik, G.: Simple and fault-tolerant key agreement for dynamic collaborative groups. In: Proceedings of the 7th ACM Conference on Computer and Communications Security, pp. 235\u2013244. ACM (2000)","DOI":"10.1145\/352600.352638"},{"issue":"4","key":"10_CR35","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1515\/JMC.2008.014","volume":"2","author":"N Koblitz","year":"2008","unstructured":"Koblitz, N., Menezes, A.: Another look at non-standard discrete log and Diffie-Hellman problems. J. Math. Cryptol. 2(4), 311\u2013326 (2008)","journal-title":"J. Math. Cryptol."}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 INDOCRYPT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-13301-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T10:02:06Z","timestamp":1765360926000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-13301-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,11]]},"ISBN":["9783032133007","9783032133014"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-13301-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,11]]},"assertion":[{"value":"11 December 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INDOCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in India","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bhubaneshwar","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"indocrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}