Results 241 to 250 of about 80,415 (263)
Some of the next articles are maybe not open access.

Forward Secure Delay-Tolerant Networking

Proceedings of the 12th Workshop on Challenged Networks, 2017
Delay-Tolerant Networks exhibit highly asynchronous connections often routed over many mobile hops before reaching its intended destination. The Bundle Security Protocol has been standardized providing properties such as authenticity, integrity, and confidentiality of bundles using traditional Public-Key Cryptography.
Signe Rüsch   +3 more
openaire   +1 more source

Forward secure searchable symmetric encryption

2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), 2017
Data outsourcing to third party clouds poses numerous data security threats. Access by unauthorized users is one of the security threat to the outsourced data. Unauthorized access can be avoided by encrypting the data before outsourcing. However, encrypting data before outsourcing renders it unsearchable to the data owner. Searchable encryption schemes
Muhammad Saqib Niaz, Gunter Saake
openaire   +1 more source

Forward-Secure Threshold Signature Schemes

2001
We construct forward-secure threshold signature schemes. These schemes have the following property: even if more than the threshold number of players are compromised, it is not possible to forge signatures relating to the past. This property is achieved while keeping the public key fix ed and updating the secret keys at regular intervals.
Michel Abdalla   +2 more
openaire   +1 more source

Forward-Secure Linkable Ring Signatures

2018
We present the first linkable ring signature scheme with both unconditional anonymity and forward-secure key update: a powerful tool which has direct applications in elegantly addressing a number of simultaneous constraints in remote electronic voting.
Boyen, Xavier, Haines, Thomas
openaire   +2 more sources

Forward Secure Attribute-Based Signatures

2012
Attribute-Based Signatures (ABS) is a versatile primitive which allows an entity to sign a message with fine-grained control over identifying information. A valid ABS only attests to the fact that "A single user, whose attributes satisfy the predicate, has endorsed the message".
Yuen, Tsz Hon   +5 more
openaire   +3 more sources

Improved Efficient Forward Secure Signature Scheme

2010 International Conference on E-Business and E-Government, 2010
B. Alomair, K. Sampigethaya and R. Poovendran proposed a generic method to construct forward secure signature schemes from standard signature schemes in EuroPKI 2008 workshop. They propose a forward secure signature scheme (ASP scheme) based on Schnorr signature scheme which is used as a black box.
Liangliang Wang, Mingxing He
openaire   +1 more source

Forward-Security Under Continual Leakage

2018
Current signature and encryption schemes secure against continual leakage fail completely if the key in any time period is fully exposed. We suggest forward security as a second line of defense, so that in the event of full exposure of the current secret key, at least uses of keys prior to this remain secure, a big benefit in practice.
Mihir Bellare   +2 more
openaire   +1 more source

Efficient Forward-Secure Threshold Signatures

2020
Forward-secure threshold signatures are useful to mitigate the damage of secret key exposure. Constructions based on bilinear pairings are particularly interesting because they achieve shorter signatures than RSA-based constructions.
openaire   +1 more source

Remote Authentication with Forward Security

2006
Password authentication has been accepted as an easy-to-use solution in network environment to protect unauthorized access to a remote server. Although many schemes have been proposed, none of them can achieve survivability in case of compromise of a server.
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
openaire   +1 more source

Forward Secure Communication in Wireless Sensor Networks

2006
We propose a set of security provisions for node to base station communication in wireless sensor networks. It supports standard security requirements, viz. authentication of the origin of data and confidentiality of data. Additionally we use key evolution to achieve forward security which is of particular importance in the face of node capture attacks.
Mauw, S., van Vessem, I., Bos, B.
openaire   +1 more source

Home - About - Disclaimer - Privacy