Results 11 to 20 of about 80,415 (263)

Strong Forward Security [PDF]

open access: yes, 2001
Forward security has been propose as a method to minimized the consequences of key exposure. In this paper we analyze this method and consider vulnerability, which is due to the fact that the exposure may not have been detected. All forward secure crytosystems proposed so far are vulnerable during the period between key exposure and it detection.
Mike Burmester   +3 more
openaire   +1 more source

Forward-Secure Distributed Encryption [PDF]

open access: yes, 2014
Distributed encryption is a cryptographic primitive that implements revocable privacy. The primitive allows a recipient of a message to decrypt it only if enough senders encrypted that same message. We present a new distributed encryption scheme that is simpler than the previous solution by Hoepman and Galindo–in particular it does not rely on pairings–
Lueks, W., Hoepman, J.H., Kursawe, K.
openaire   +2 more sources

Forward Secure Conjunctive-Keyword Searchable Encryption

open access: yesIEEE Access, 2019
Searchable symmetric encryption (SSE) has been applied in constructing secure cloud storage for its simplicity, high-efficiency, and practicality. Recent works show that forward privacy has become a fundamental property required for SSE, and several ...
Chengyu Hu   +6 more
doaj   +1 more source

A fully dynamic forward-secure group signature from lattice

open access: yesCybersecurity, 2022
A forward-secure group signature (FSGS) ensures the unforgeability of signatures in the past time period despite signing secret key is leaked in the current time period.
Zhijian Liao, Qiong Huang, Xinjian Chen
doaj   +1 more source

An Efficient Certificateless Forward-Secure Signature Scheme for Secure Deployments of the Internet of Things

open access: yesJournal of Sensor and Actuator Networks, 2023
As an extension of the wired network, the use of the wireless communication network has considerably boosted users’ productivity at work and in their daily lives.
Tahir Ali Shah   +4 more
doaj   +1 more source

The ForwardDiffSig scheme for multicast authentication [PDF]

open access: yes, 2010
This paper describes ForwardDiffSig, an efficient scheme for multicast authentication with forward security. This scheme provides source authentication, data integrity, and non-repudiation since it is based on the use of asymmetric cryptography.
Albertalli, L.   +2 more
core   +1 more source

Forward-Secure Multi-User Aggregate Signatures Based on zk-SNARKs

open access: yesIEEE Access, 2021
As a solution to mitigate the key exposure problems in the digital signature, the forward security has been proposed. The forward security guarantees the integrity of the messages generated in the past despite leaks of a current time period secret key by
Jeonghyuk Lee, Jihye Kim, Hyunok Oh
doaj   +1 more source

Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain [PDF]

open access: yes, 2018
We present “Ouroboros Praos”, a proof-of-stake blockchain protocol that, for the first time, provides security against fully-adaptive corruption in the semi-synchronous setting: Specifically, the adversary can corrupt any participant of a dynamically ...
A Kiayias   +12 more
core   +1 more source

Forward-Secure Linkable Ring Signatures from Bilinear Maps

open access: yesCryptography, 2018
We present the first linkable ring signature scheme with both unconditional anonymity and forward-secure key update: a powerful tool which has direct applications in elegantly addressing a number of simultaneous constraints in remote electronic voting ...
Xavier Boyen, Thomas Haines
doaj   +1 more source

Binary Tree Based Forward Secure Signature Scheme in the Random Oracle Model [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2021
In this paper we construct and consider a new group-based digital signature scheme with evolving secret key, which is built using a bilinear map. This map is an asymmetric pairing of Type 3, and although, for the reason of this paper, it is treated in a ...
Mariusz Jurkiewicz
doaj   +1 more source

Home - About - Disclaimer - Privacy