Results 11 to 20 of about 1,094,705 (275)

Forward-Secure Hierarchical Predicate Encryption [PDF]

open access: yesThe Computer Journal, 2013
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz (Eurocrypt 2003), reduces damage from compromised keys by guaranteeing confidentiality of messages ...
Gonzalez Nieto, Juan   +2 more
openaire   +6 more sources

Secure Computation-and-Forward With Linear Codes [PDF]

open access: yesIEEE Journal on Selected Areas in Information Theory, 2021
We discuss secure transmission via an untrusted relay when we have a multiple access phase from two nodes to the relay and broadcast phase from the relay to the two nodes. To realize the security, we construct a code that securely transmits the modulo sum of the messages of two nodes via a multiple access channel.
Masahito Hayashi   +2 more
openaire   +3 more sources

Forward Secure Conjunctive-Keyword Searchable Encryption

open access: yesIEEE Access, 2019
Searchable symmetric encryption (SSE) has been applied in constructing secure cloud storage for its simplicity, high-efficiency, and practicality. Recent works show that forward privacy has become a fundamental property required for SSE, and several ...
Chengyu Hu   +6 more
doaj   +3 more sources

A fully dynamic forward-secure group signature from lattice

open access: yesCybersecurity, 2022
A forward-secure group signature (FSGS) ensures the unforgeability of signatures in the past time period despite signing secret key is leaked in the current time period.
Zhijian Liao, Qiong Huang, Xinjian Chen
doaj   +1 more source

An Efficient Certificateless Forward-Secure Signature Scheme for Secure Deployments of the Internet of Things

open access: yesJournal of Sensor and Actuator Networks, 2023
As an extension of the wired network, the use of the wireless communication network has considerably boosted users’ productivity at work and in their daily lives.
Tahir Ali Shah   +4 more
doaj   +1 more source

Forward-Secure Multi-User Aggregate Signatures Based on zk-SNARKs

open access: yesIEEE Access, 2021
As a solution to mitigate the key exposure problems in the digital signature, the forward security has been proposed. The forward security guarantees the integrity of the messages generated in the past despite leaks of a current time period secret key by
Jeonghyuk Lee, Jihye Kim, Hyunok Oh
doaj   +1 more source

Forward-Secure Distributed Encryption [PDF]

open access: yes, 2014
Distributed encryption is a cryptographic primitive that implements revocable privacy. The primitive allows a recipient of a message to decrypt it only if enough senders encrypted that same message. We present a new distributed encryption scheme that is simpler than the previous solution by Hoepman and Galindo–in particular it does not rely on pairings–
Lueks, W., Hoepman, J.H., Kursawe, K.
openaire   +2 more sources

Forward-Security in Private-Key Cryptography [PDF]

open access: yes, 2002
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure.
A. Desai   +14 more
core   +2 more sources

Binary Tree Based Forward Secure Signature Scheme in the Random Oracle Model [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2021
In this paper we construct and consider a new group-based digital signature scheme with evolving secret key, which is built using a bilinear map. This map is an asymmetric pairing of Type 3, and although, for the reason of this paper, it is treated in a ...
Mariusz Jurkiewicz
doaj   +1 more source

Forward-Secure Linkable Ring Signatures from Bilinear Maps

open access: yesCryptography, 2018
We present the first linkable ring signature scheme with both unconditional anonymity and forward-secure key update: a powerful tool which has direct applications in elegantly addressing a number of simultaneous constraints in remote electronic voting ...
Xavier Boyen, Thomas Haines
doaj   +1 more source

Home - About - Disclaimer - Privacy