Results 251 to 260 of about 1,471,228 (283)
Some of the next articles are maybe not open access.

Efficient Forward-Secure Threshold Signatures

2020
Forward-secure threshold signatures are useful to mitigate the damage of secret key exposure. Constructions based on bilinear pairings are particularly interesting because they achieve shorter signatures than RSA-based constructions.
openaire   +1 more source

Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems

2012
Threshold cryptography aims at enhancing the availability and security of decryption and signature schemes by splitting private keys into several (say n) shares (typically, each of size comparable to the original secret key). In these schemes, a quorum of at least (d≤n) servers needs to act upon a message to produce the result (decrypted value or ...
Benoît Libert, Moti Yung
openaire   +1 more source

Forward-Secure Encryption with Fast Forwarding

2022
Yevgeniy Dodis   +2 more
openaire   +1 more source

Security analysis of a flexible forward-secure signature scheme

IET 2nd International Conference on Wireless, Mobile and Multimedia Networks (ICWMMN 2008), 2008
Huang and Chang proposed a flexible forward-secure signature scheme in International Journal of Computer Science and Network Security in 2006. In this paper, we give the security analysis of this scheme and point out this scheme doesn't satisfy the forward security.
null Jia Yu   +5 more
openaire   +1 more source

Remote Authentication with Forward Security

2006
Password authentication has been accepted as an easy-to-use solution in network environment to protect unauthorized access to a remote server. Although many schemes have been proposed, none of them can achieve survivability in case of compromise of a server.
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
openaire   +1 more source

Forward Secure Message Franking

2022
Hiroki Yamamuro   +4 more
openaire   +1 more source

Forward Secure Communication in Wireless Sensor Networks

2006
We propose a set of security provisions for node to base station communication in wireless sensor networks. It supports standard security requirements, viz. authentication of the origin of data and confidentiality of data. Additionally we use key evolution to achieve forward security which is of particular importance in the face of node capture attacks.
Mauw, S., van Vessem, I., Bos, B.
openaire   +1 more source

Practical Forward Secure Signatures using Minimal Security Assumptions

2013
Digital signatures are one of the most important cryptographic primitives in practice. They are an enabling technology for eCommerce and eGovernment applications and they are used to distribute software updates over the Internet in a secure way. In this work we introduce two new digital signature schemes: XMSS and its extension XMSS^MT.
openaire   +1 more source

Antibiotic resistance in the patient with cancer: Escalating challenges and paths forward

Ca-A Cancer Journal for Clinicians, 2021
Amila K Nanayakkara, Kevin Outterson
exaly  

Climate change impacts on plant pathogens, food security and paths forward

Nature Reviews Microbiology, 2023
Brajesh K Singh   +2 more
exaly  

Home - About - Disclaimer - Privacy