Results 121 to 130 of about 95,997 (171)
Some of the next articles are maybe not open access.
A Practical Forward-Secure DualRing
2023Ring signature allows a signer to generate a signature on behalf of a set of public keys, while a verifier can verify the signature without identifying who the actual signer is. In Crypto 2021, Yuen et al. proposed a new type of ring signature scheme called DualRing. However, it lacks forward security.
Li, Nan +4 more
openaire +3 more sources
Forward Security with Crash Recovery for Secure Logs
ACM Transactions on Privacy and Security, 2023Logging is a key mechanism in the security of computer systems. Beyond supporting important forward security properties, it is critical that logging withstands both failures and intentional tampering to prevent subtle attacks leaving the system in an inconsistent state with inconclusive evidence. We propose new techniques combining forward
Erik-Oliver Blass, Guevara Noubir
openaire +1 more source
Forward-secure identity-based signature: Security notions and construction
Information Sciences, 2011zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yu, Jia +5 more
openaire +2 more sources
FAS: Forward secure sequential aggregate signatures for secure logging
Information Sciences, 2019zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jihye Kim, Hyunok Oh
openaire +2 more sources
Forward-secure ID based digital signature scheme with forward-secure private key generator
Information Sciences, 2018zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hyunok Oh, Jihye Kim, Ji Sun Shin
openaire +1 more source
Moving forward? [digital security]
IEEE Security & Privacy, 2003The US government and the European Commission recently made major Cyber security policy pronouncements in their attempts to achieve the right mix. The US strategy states that the newly created Department of Homeland Security will become a federal center of excellence for Cyber security, providing a focal point for federal outreach to state and local ...
openaire +1 more source
Forward-Secure Multi-signatures
2008In many applications a document needs to be signed by more than one signer. When a signature depends on more than one signer we call it a multi-signature. Further, ordinary digital signatures have an inherent weakness: if the secret key is leaked, then all signatures, even the ones generated before the leak, are no longer trustworthy.
N. R. Sunitha, B. B. Amberker
openaire +1 more source
Forward-Secure Certificate-Based Encryption
2009 Fifth International Conference on Information Assurance and Security, 2009Certificate-based encryption (CBE) is a new paradigm which overcomes the shortcomings of traditional public-key encryption (PKE) and identity based encryption (IBE). CBE provides an efficient implicit certificate mechanism to eliminate third-party queries for the certificate status and to simplify the certificate revocation problem in traditional PKI ...
Yang Lu, Jiguo Li
openaire +1 more source

