Results 1 to 10 of about 95,997 (171)

Lattice-based group signatures with forward security for anonymous authentication [PDF]

open access: yesHeliyon, 2023
Group signatures allow users to sign messages on behalf of a group without revealing authority is capable of identifying the user who generated it. However, the exposure of the user's signing key will severely damage the group signature scheme.
Simin Chen, Jiageng Chen
doaj   +2 more sources

DS-CKDSE: A Dual-Server Conjunctive Keyword Dynamic Searchable Encryption with Forward and Backward Security [PDF]

open access: yesEntropy
Dynamic Searchable Encryption (DSE) is essential for enabling confidential search operations over encrypted data in cloud computing. However, all existing single-server DSE schemes are vulnerable to Keyword Pair Result Pattern (KPRP) leakage and fail to ...
Haiyan Sun   +3 more
doaj   +2 more sources

Forward secure proxy signature scheme

open access: yesTongxin xuebao, 2005
A forward secure proxy signature scheme was proposed combining the concept of forward security with proxy signature. This means even if an adversary has gotten the current proxy signers’ key.
WANG Xiao-ming   +2 more
doaj   +3 more sources

A remote sensing encrypted data search method based on a novel double-chain

open access: yesConnection Science, 2023
Remote sensing is considered to be a key technology for the development of smart cities. By analysing the data obtained by remote sensing, it is effective to manage and develop smart cities.
Xixi Yan   +3 more
doaj   +1 more source

5G Handover: When Forward Security Breaks

open access: yesProceedings of the 20th International Conference on Security and Cryptography, 2023
5G mobility management is dependent on a couple of complex protocols for managing handovers, based on the available network interfaces (such as Xn and N2). In our work, we focus on the 5G Xn handover procedure, as defined by the 3GPP standard. In Xn handovers, the source base station hands the user equipment (UE) over to a target base station through ...
Sivaraman, Navya, Tehrani, Simin-Nadjm
openaire   +2 more sources

Protocol to enhance the security of Early data in TLS 1.3

open access: yes网络与信息安全学报, 2017
The new 0-RTT Internet key exchange was drawn on the TLS 1.3 session resumption phase,the rFSOPKE protocol was constructed,and the Early data encryption and transmission process were improved.The rFSOPKE protocol can protect the forward security of Early
Xing-long ZHANG   +2 more
doaj   +3 more sources

Towards Forward Secure Internet Traffic [PDF]

open access: yes, 2019
Forward Secrecy (FS) is a security property in key-exchange algorithms which guarantees that a compromise in the secrecy of a long-term private-key does not compromise the secrecy of past session keys. With a growing awareness of long-term mass surveillance programs by governments and others, FS has become widely regarded as a highly desirable property.
Alashwali, E, Szalachowski, P, Martin, A
openaire   +3 more sources

Forward-Secure Linkable Ring Signatures from Bilinear Maps

open access: yesCryptography, 2018
We present the first linkable ring signature scheme with both unconditional anonymity and forward-secure key update: a powerful tool which has direct applications in elegantly addressing a number of simultaneous constraints in remote electronic voting ...
Xavier Boyen, Thomas Haines
doaj   +1 more source

A Searchable Encryption with Forward/Backward Security and Constant Storage

open access: yesApplied Sciences, 2023
Dynamic searchable encryption satisfies users’ needs for ciphertext retrieval on semi-trusted servers, while allowing users to update server-side data.
Suzhen Cao   +3 more
doaj   +1 more source

Strong Forward Security [PDF]

open access: yes, 2001
Forward security has been propose as a method to minimized the consequences of key exposure. In this paper we analyze this method and consider vulnerability, which is due to the fact that the exposure may not have been detected. All forward secure crytosystems proposed so far are vulnerable during the period between key exposure and it detection.
Mike Burmester   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy