Results 231 to 240 of about 80,415 (263)

Forward-Security in Private-Key Cryptography [PDF]

open access: yes, 2003
This paper provides a comprehensive treatment of forwardsecurity in the context of shared-key based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure. We provide definitions of security, practical proven-secure constructions, and applications for the main primitives in this area.
Mihir Bellare, Bennet Yee
openaire   +4 more sources

A Practical Forward-Secure DualRing

2023
Ring signature allows a signer to generate a signature on behalf of a set of public keys, while a verifier can verify the signature without identifying who the actual signer is. In Crypto 2021, Yuen et al. proposed a new type of ring signature scheme called DualRing. However, it lacks forward security.
Li, Nan   +4 more
openaire   +3 more sources

Forward Secure Fuzzy Extractors [PDF]

open access: yes, 2007
Computer ScienceMaster of Science (M.Sc.
Goldenberg, David
openaire   +3 more sources

Forward-secure ID based digital signature scheme with forward-secure private key generator

Information Sciences, 2018
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hyunok Oh, Jihye Kim, Ji Sun Shin
openaire   +1 more source

Forward-Secure Certificate-Based Encryption

2009 Fifth International Conference on Information Assurance and Security, 2009
Certificate-based encryption (CBE) is a new paradigm which overcomes the shortcomings of traditional public-key encryption (PKE) and identity based encryption (IBE). CBE provides an efficient implicit certificate mechanism to eliminate third-party queries for the certificate status and to simplify the certificate revocation problem in traditional PKI ...
Yang Lu, Jiguo Li
openaire   +1 more source

Forward-Secure Multi-signatures

2008
In many applications a document needs to be signed by more than one signer. When a signature depends on more than one signer we call it a multi-signature. Further, ordinary digital signatures have an inherent weakness: if the secret key is leaked, then all signatures, even the ones generated before the leak, are no longer trustworthy.
N. R. Sunitha, B. B. Amberker
openaire   +1 more source

Home - About - Disclaimer - Privacy