Results 251 to 260 of about 80,415 (263)
Some of the next articles are maybe not open access.
Forward-Secure Group Signatures from Pairings
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2009To reduce the damage of key exposures, forward-secure group signature schemes have been first proposed by Song. In the forward-secure schemes, a secret key of a group member is updated by a one-way function every interval and the previous secret key is erased. Thus, even if a secret key is exposed, the signatures produced by the secret keys of previous
Toru NAKANISHI +2 more
openaire +1 more source
Forward Secure Proxy Blind Signature Scheme
2011 Third International Conference on Intelligent Networking and Collaborative Systems, 2011There is no forward security in any proxy blind signature schemes today. The lack of forward security will impact the system security tremendously if the key is stolen. To avoid such a security problem this paper proposes a forward secure proxy blind signature scheme which employs the key evolution mechanism in a newly proposed proxy blind signature ...
Kai Fan, Yue Wang, Hui Li
openaire +1 more source
Clustering Key Management of Forward Security
2010 Second International Conference on Future Networks, 2010Based on the clustering model which takes the fully distributed CA private key management scheme, and combined the trust assessment strategy in dynamic, we proposed a new type of key management scheme with forward security. We also carried out some simulation experiments.
Zhiwei Jiang, Changjiang Wei
openaire +1 more source
Forward-secure signatures with untrusted update
Proceedings of the 13th ACM conference on Computer and communications security, 2006In most forward-secure signature constructions, a program that updates a user's private signing key must have full access to the private key. Unfortunately, these schemes are incompatible with several security architectures including Gnu Privacy Guard (GPG) and S/MIME, where the private key is encrypted under a user password as a "second factor" of ...
Xavier Boyen +3 more
openaire +1 more source
A new forward-secure signature scheme
2008 27th Chinese Control Conference, 2008Elliptic curve cryptosystem is an efficient public key cryptosystem. Recently the bilinear pairing such as the Weil pairing or the Tate pairing on elliptic curves and elliptic curves have been found various applications in cryptography. Forward security makes sure of the validity of signature for former phases if the private key in the signature is ...
null Liu Yali +3 more
openaire +1 more source
Unit commitment with forward security constraint
2006 IEEE Power Engineering Society General Meeting, 2006In today's standard market design (SMD), the adequacy of unit commitment is vital to the market clearing and pricing for day ahead market. Unit commitment (UC) with forward security constraint in day ahead market are discussed. Along with the market inputs and generic constraints, daily-based severe security constraints can be forwarded into the UC ...
null Jianwei Liu +2 more
openaire +1 more source
Forward-secure commercial key escrow systems
Proceedings Tenth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE 2001, 2002Key escrow system has been studied widely in recent years to reduce the gap between the needs for individual privacy and the needs for public security. In this paper, we survey three popular key escrow products of Netscape's, VeriSign's and Entrust's. And we also propose forward-secure KESs (Key Escrow Systems) and analyze their security.
null Jeeyeon Kim +5 more
openaire +1 more source
Forward-Secure Traceable Ring Signature
Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), 2007Chengyu Hu, Daxing Li
openaire +1 more source
Forward Security Under Leakage Resilience, Revisited
2023Suvradip Chakraborty +3 more
openaire +1 more source

