Results 21 to 30 of about 80,415 (263)
A Forward-Secure Public-Key Encryption Scheme* [PDF]
Cryptographic computations are often carried out on insecure devices for which the threat of key exposure represents a serious concern. Forward security allows one to mitigate the damage caused by exposure of secret keys. In a forward-secure scheme, secret keys are updated at regular periods of time; exposure of the secret key corresponding to a given ...
Ran Canetti, Shai Halevi, Jonathan Katz
openaire +1 more source
A Forward-secure Grouping-proof Protocol for Multiple RFID Tags [PDF]
Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT).
Liu Ya-li +3 more
doaj +1 more source
A Forward-Secure Digital Signature Based on Elliptic Curve
The forward-secure digital signature is an important digital signature scheme.It requires that even if the attackers have already been given a signature key by invading a system in t time,it still can’t forge signatures before time t.In other words,the ...
Huiyan Chen +4 more
doaj +2 more sources
Toward Forward Secure SSE Supporting Conjunctive Keyword Search
The primitive of Searchable Symmetric Encryption (SSE) allows a server to perform search directly over encrypted documents. Recently, forward secure SSE (FSSE) has attracted significant attention due to its secure property for document update.
Yunling Wang +4 more
doaj +1 more source
UC and EUC Weak Bit-Commitments Using Seal-Once Tamper-Evidence [PDF]
Based on tamper-evident devices, i.e., a type of distinguishable, sealed envelopes, we put forward weak bit-commitment protocols which are UC-secure. These commitments are weak in that it is legitimate that a party could cheat.
I. Boureanu, S. Vaudenay
doaj +1 more source
Identity-based puncturable signature scheme
To overcome the shortcomings of available forward-secure identity-based signature (IBS) scheme in terms of actual practicability and secret key update efficiency, the notion of identity-based puncturable signature (IBPS) scheme was proposed based on the ...
Dongmei YANG +3 more
doaj +2 more sources
Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations
Herrera Joancomartí, Jordi +1 more
core +4 more sources
Forward-secure ciphertext-policy attribute-based encryption scheme
To mitigate the damage of key exposure in the context of ciphertext-policy attribute-based encryption (CP-ABE). The syntax and security model of forward-secure CP-ABE was presented. Then, a concreted forward-secure CP-ABE scheme was constructed.
EIJiang-hong W, IUWen-fen L, UXue-xian H
doaj +2 more sources
A Modern View on Forward Security [PDF]
Abstract Forward security ensures that compromise of entities today does not impact the security of cryptographic primitives employed in the past. Such a form of security is regarded as increasingly important in the modern world due to the existence of adversaries with mass storage capabilities and powerful infiltration abilities ...
Colin Boyd, Kai Gellert
openaire +1 more source
A Secure Traitor Tracing Scheme against Key Exposure
Copyright protection is a major issue in distributing digital content. On the other hand, improvements to usability are sought by content users. In this paper, we propose a secure {\it traitor tracing scheme against key exposure (TTaKE)} which contains ...
Hanaoka, Goichiro +2 more
core +2 more sources

