Results 241 to 250 of about 81,733 (278)
Some of the next articles are maybe not open access.

Forward Secure Attribute-Based Signatures

2012
Attribute-Based Signatures (ABS) is a versatile primitive which allows an entity to sign a message with fine-grained control over identifying information. A valid ABS only attests to the fact that "A single user, whose attributes satisfy the predicate, has endorsed the message".
Yuen, Tsz Hon   +5 more
openaire   +3 more sources

Improved Efficient Forward Secure Signature Scheme

2010 International Conference on E-Business and E-Government, 2010
B. Alomair, K. Sampigethaya and R. Poovendran proposed a generic method to construct forward secure signature schemes from standard signature schemes in EuroPKI 2008 workshop. They propose a forward secure signature scheme (ASP scheme) based on Schnorr signature scheme which is used as a black box.
Liangliang Wang, Mingxing He
openaire   +1 more source

Forward-Security Under Continual Leakage

2018
Current signature and encryption schemes secure against continual leakage fail completely if the key in any time period is fully exposed. We suggest forward security as a second line of defense, so that in the event of full exposure of the current secret key, at least uses of keys prior to this remain secure, a big benefit in practice.
Mihir Bellare   +2 more
openaire   +1 more source

Efficient Forward-Secure Threshold Signatures

2020
Forward-secure threshold signatures are useful to mitigate the damage of secret key exposure. Constructions based on bilinear pairings are particularly interesting because they achieve shorter signatures than RSA-based constructions.
openaire   +1 more source

Remote Authentication with Forward Security

2006
Password authentication has been accepted as an easy-to-use solution in network environment to protect unauthorized access to a remote server. Although many schemes have been proposed, none of them can achieve survivability in case of compromise of a server.
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
openaire   +1 more source

Forward Secure Communication in Wireless Sensor Networks

2006
We propose a set of security provisions for node to base station communication in wireless sensor networks. It supports standard security requirements, viz. authentication of the origin of data and confidentiality of data. Additionally we use key evolution to achieve forward security which is of particular importance in the face of node capture attacks.
Mauw, S., van Vessem, I., Bos, B.
openaire   +1 more source

Forward-Secure Group Signatures from Pairings

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2009
To reduce the damage of key exposures, forward-secure group signature schemes have been first proposed by Song. In the forward-secure schemes, a secret key of a group member is updated by a one-way function every interval and the previous secret key is erased. Thus, even if a secret key is exposed, the signatures produced by the secret keys of previous
Toru NAKANISHI   +2 more
openaire   +1 more source

Forward Secure Proxy Blind Signature Scheme

2011 Third International Conference on Intelligent Networking and Collaborative Systems, 2011
There is no forward security in any proxy blind signature schemes today. The lack of forward security will impact the system security tremendously if the key is stolen. To avoid such a security problem this paper proposes a forward secure proxy blind signature scheme which employs the key evolution mechanism in a newly proposed proxy blind signature ...
Kai Fan, Yue Wang, Hui Li
openaire   +1 more source

Clustering Key Management of Forward Security

2010 Second International Conference on Future Networks, 2010
Based on the clustering model which takes the fully distributed CA private key management scheme, and combined the trust assessment strategy in dynamic, we proposed a new type of key management scheme with forward security. We also carried out some simulation experiments.
Zhiwei Jiang, Changjiang Wei
openaire   +1 more source

Forward-secure signatures with untrusted update

Proceedings of the 13th ACM conference on Computer and communications security, 2006
In most forward-secure signature constructions, a program that updates a user's private signing key must have full access to the private key. Unfortunately, these schemes are incompatible with several security architectures including Gnu Privacy Guard (GPG) and S/MIME, where the private key is encrypted under a user password as a "second factor" of ...
Xavier Boyen   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy