Results 1 to 10 of about 80,415 (263)

Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes [PDF]

open access: yesEntropy, 2023
The security of digital signatures depends significantly on the signature key. Therefore, to reduce the impact of leaked keys upon existing signatures and subsequent ones, a digital signature scheme with strong forward security could be an effective ...
Fengyin Li   +4 more
doaj   +2 more sources

Forward-Secure Hierarchical Predicate Encryption [PDF]

open access: yesThe Computer Journal, 2013
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz (Eurocrypt 2003), reduces damage from compromised keys by guaranteeing confidentiality of messages ...
Gonzalez Nieto, Juan   +2 more
openaire   +6 more sources

Forward secure proxy signature scheme

open access: yesTongxin xuebao, 2005
A forward secure proxy signature scheme was proposed combining the concept of forward security with proxy signature. This means even if an adversary has gotten the current proxy signers’ key.
WANG Xiao-ming   +2 more
doaj   +3 more sources

5G Handover: When Forward Security Breaks

open access: yesProceedings of the 20th International Conference on Security and Cryptography, 2023
5G mobility management is dependent on a couple of complex protocols for managing handovers, based on the available network interfaces (such as Xn and N2). In our work, we focus on the 5G Xn handover procedure, as defined by the 3GPP standard. In Xn handovers, the source base station hands the user equipment (UE) over to a target base station through ...
Sivaraman, Navya, Tehrani, Simin-Nadjm
openaire   +2 more sources

Forward Secure Sequential Aggregate Signature Schemes on Lattice

open access: yesJisuanji kexue yu tansuo, 2021
The forward secure sequential aggregate (Fss-Agg) signature has the advantages of forward secure signature and the sequential aggregate signature at the same time. Since its proposal in 2007, it has been widely applied in many application scenarios, such
XIE Jia, HU Yupu, GAO Juntao, WANG Baocang, JIANG Mingming
doaj   +1 more source

Fine-Grained Forward Secure Firmware Update in Smart Home

open access: yesMathematics, 2023
Although the vigorous development of smart homes brings great convenience to people’s lives, smart homes usually suffer from various security threats due to firmware vulnerabilities.
Qiuxia Zhao   +3 more
doaj   +1 more source

Forward Secure Proxy Signature Scheme over NTRU Lattice [PDF]

open access: yesJisuanji gongcheng, 2019
Most existing forward secure proxy signature schemes are constructed based on traditional number theory problems,such as large integer decomposition,discrete logarithm and bilinear pairs,and they are easy to be cracked in a quantum computing environment ...
YE Qing, YANG Xiaomeng, ZHAO Zongqu, ZHANG Jing
doaj   +1 more source

Towards Forward Secure Internet Traffic [PDF]

open access: yes, 2019
Forward Secrecy (FS) is a security property in key-exchange algorithms which guarantees that a compromise in the secrecy of a long-term private-key does not compromise the secrecy of past session keys. With a growing awareness of long-term mass surveillance programs by governments and others, FS has become widely regarded as a highly desirable property.
Alashwali, E, Szalachowski, P, Martin, A
openaire   +3 more sources

To Design a Network That Delivers Reliable Performance 24 Hours a Day 7 Days a Week for Higher Education in Uganda [PDF]

open access: yesEAI Endorsed Transactions on Internet of Things, 2020
It aims at existing defects of traditional VPN (Virtual Private Network) in constructing enterprise network, analyses problems which must be considered in designing secure enterprise network, puts forward solution of DMVPN (Dynamic ...
Yakubu Makeri
doaj   +1 more source

Forward Secure Lattice-Based Sequential Aggregate Signature Schemes in Stan-dard Model

open access: yesJisuanji kexue yu tansuo, 2021
In the forward secure sequential aggregate (FssAgg) signature scheme, the signer combines signatures generated in different intervals under different secret keys incrementally and sequentially in a layered “onion-like” fashion with the first signature ...
XIE Jia, HU Yupu, GAO Juntao, WANG Baocang, JIANG Mingming
doaj   +1 more source

Home - About - Disclaimer - Privacy