Results 231 to 240 of about 1,094,705 (275)
Some of the next articles are maybe not open access.

Forward-secure identity-based signature: Security notions and construction

Information Sciences, 2011
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yu, Jia   +5 more
openaire   +4 more sources

A Practical Forward-Secure DualRing

2023
Ring signature allows a signer to generate a signature on behalf of a set of public keys, while a verifier can verify the signature without identifying who the actual signer is. In Crypto 2021, Yuen et al. proposed a new type of ring signature scheme called DualRing. However, it lacks forward security.
Li, Nan   +4 more
openaire   +3 more sources

Forward Security with Crash Recovery for Secure Logs

ACM Transactions on Privacy and Security, 2023
Logging is a key mechanism in the security of computer systems. Beyond supporting important forward security properties, it is critical that logging withstands both failures and intentional tampering to prevent subtle attacks leaving the system in an inconsistent state with inconclusive evidence. We propose new techniques combining forward
Erik-Oliver Blass, Guevara Noubir
openaire   +1 more source

FAS: Forward secure sequential aggregate signatures for secure logging

Information Sciences, 2019
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jihye Kim, Hyunok Oh
openaire   +2 more sources

Moving forward? [digital security]

IEEE Security & Privacy, 2003
The US government and the European Commission recently made major Cyber security policy pronouncements in their attempts to achieve the right mix. The US strategy states that the newly created Department of Homeland Security will become a federal center of excellence for Cyber security, providing a focal point for federal outreach to state and local ...
openaire   +1 more source

Forward-Secure Multi-signatures

2008
In many applications a document needs to be signed by more than one signer. When a signature depends on more than one signer we call it a multi-signature. Further, ordinary digital signatures have an inherent weakness: if the secret key is leaked, then all signatures, even the ones generated before the leak, are no longer trustworthy.
N. R. Sunitha, B. B. Amberker
openaire   +1 more source

Forward-Secure Certificate-Based Encryption

2009 Fifth International Conference on Information Assurance and Security, 2009
Certificate-based encryption (CBE) is a new paradigm which overcomes the shortcomings of traditional public-key encryption (PKE) and identity based encryption (IBE). CBE provides an efficient implicit certificate mechanism to eliminate third-party queries for the certificate status and to simplify the certificate revocation problem in traditional PKI ...
Yang Lu, Jiguo Li
openaire   +1 more source

Forward Secure Delay-Tolerant Networking

Proceedings of the 12th Workshop on Challenged Networks, 2017
Delay-Tolerant Networks exhibit highly asynchronous connections often routed over many mobile hops before reaching its intended destination. The Bundle Security Protocol has been standardized providing properties such as authenticity, integrity, and confidentiality of bundles using traditional Public-Key Cryptography.
Signe Rüsch   +3 more
openaire   +1 more source

Forward-Secure Threshold Signature Schemes

2001
We construct forward-secure threshold signature schemes. These schemes have the following property: even if more than the threshold number of players are compromised, it is not possible to forge signatures relating to the past. This property is achieved while keeping the public key fix ed and updating the secret keys at regular intervals.
Michel Abdalla   +2 more
openaire   +1 more source

Forward secure searchable symmetric encryption

2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), 2017
Data outsourcing to third party clouds poses numerous data security threats. Access by unauthorized users is one of the security threat to the outsourced data. Unauthorized access can be avoided by encrypting the data before outsourcing. However, encrypting data before outsourcing renders it unsearchable to the data owner. Searchable encryption schemes
Muhammad Saqib Niaz, Gunter Saake
openaire   +1 more source

Home - About - Disclaimer - Privacy