Results 241 to 250 of about 1,094,705 (275)
Some of the next articles are maybe not open access.
Forward-Secure Linkable Ring Signatures
2018We present the first linkable ring signature scheme with both unconditional anonymity and forward-secure key update: a powerful tool which has direct applications in elegantly addressing a number of simultaneous constraints in remote electronic voting.
Boyen, Xavier, Haines, Thomas
openaire +2 more sources
Forward-Security Under Continual Leakage
2018Current signature and encryption schemes secure against continual leakage fail completely if the key in any time period is fully exposed. We suggest forward security as a second line of defense, so that in the event of full exposure of the current secret key, at least uses of keys prior to this remain secure, a big benefit in practice.
Mihir Bellare +2 more
openaire +1 more source
Forward Secure Attribute-Based Signatures
2012Attribute-Based Signatures (ABS) is a versatile primitive which allows an entity to sign a message with fine-grained control over identifying information. A valid ABS only attests to the fact that "A single user, whose attributes satisfy the predicate, has endorsed the message".
Yuen, Tsz Hon +5 more
openaire +3 more sources
Efficient Forward-Secure Threshold Signatures
2020Forward-secure threshold signatures are useful to mitigate the damage of secret key exposure. Constructions based on bilinear pairings are particularly interesting because they achieve shorter signatures than RSA-based constructions.
openaire +1 more source
Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems
2012Threshold cryptography aims at enhancing the availability and security of decryption and signature schemes by splitting private keys into several (say n) shares (typically, each of size comparable to the original secret key). In these schemes, a quorum of at least (d≤n) servers needs to act upon a message to produce the result (decrypted value or ...
Benoît Libert, Moti Yung
openaire +1 more source
Security analysis of a flexible forward-secure signature scheme
IET 2nd International Conference on Wireless, Mobile and Multimedia Networks (ICWMMN 2008), 2008Huang and Chang proposed a flexible forward-secure signature scheme in International Journal of Computer Science and Network Security in 2006. In this paper, we give the security analysis of this scheme and point out this scheme doesn't satisfy the forward security.
null Jia Yu +5 more
openaire +1 more source
Remote Authentication with Forward Security
2006Password authentication has been accepted as an easy-to-use solution in network environment to protect unauthorized access to a remote server. Although many schemes have been proposed, none of them can achieve survivability in case of compromise of a server.
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
openaire +1 more source
Forward Secure Communication in Wireless Sensor Networks
2006We propose a set of security provisions for node to base station communication in wireless sensor networks. It supports standard security requirements, viz. authentication of the origin of data and confidentiality of data. Additionally we use key evolution to achieve forward security which is of particular importance in the face of node capture attacks.
Mauw, S., van Vessem, I., Bos, B.
openaire +1 more source

