Results 21 to 30 of about 1,471,228 (283)
A Searchable Encryption with Forward/Backward Security and Constant Storage
Dynamic searchable encryption satisfies users’ needs for ciphertext retrieval on semi-trusted servers, while allowing users to update server-side data.
Suzhen Cao +3 more
doaj +1 more source
Forward security has been propose as a method to minimized the consequences of key exposure. In this paper we analyze this method and consider vulnerability, which is due to the fact that the exposure may not have been detected. All forward secure crytosystems proposed so far are vulnerable during the period between key exposure and it detection.
Mike Burmester +3 more
openaire +1 more source
A New Digital Signature Primitive and Its Application in Blockchain
In this paper, we propose a new digital signature primitive, called expander signature, and discuss its application in blockchain. The most promising advantage of expander signature is that a signer can generate all signatures at once using a powerful ...
Xiang Zou, Peng Zeng
doaj +1 more source
Forward-Secure Multi-User Aggregate Signatures Based on zk-SNARKs
As a solution to mitigate the key exposure problems in the digital signature, the forward security has been proposed. The forward security guarantees the integrity of the messages generated in the past despite leaks of a current time period secret key by
Jeonghyuk Lee, Jihye Kim, Hyunok Oh
doaj +1 more source
Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes
The security of digital signatures depends significantly on the signature key. Therefore, to reduce the impact of leaked keys upon existing signatures and subsequent ones, a digital signature scheme with strong forward security could be an effective ...
Fengyin Li +4 more
doaj +1 more source
Not quite the 'Great Britain of the Far East': Japan's security, the US-Japan alliance and the 'war on terror' in East Asia [PDF]
Japan, in responding to US expectations for support in the 'war on terror', has displayed a degree of strategic convergence on global security objectives, thus prompting policy-makers and observers to dub it the 'Great Britain of the Far East'.
Christopher W Hughes +13 more
core +1 more source
A Note on an Improved Self-Healing Group Key Distribution Scheme
In 2014, Chen et al. proposed a one-way hash self-healing group key distribution scheme for resource-constrained wireless networks in the journal of Sensors (14(14):24358-24380, doi: 10.3390/ s141224358).
Hua Guo +3 more
doaj +1 more source
Forward-Secure Distributed Encryption [PDF]
Distributed encryption is a cryptographic primitive that implements revocable privacy. The primitive allows a recipient of a message to decrypt it only if enough senders encrypted that same message. We present a new distributed encryption scheme that is simpler than the previous solution by Hoepman and Galindo–in particular it does not rely on pairings–
Lueks, W., Hoepman, J.H., Kursawe, K.
openaire +2 more sources
Secure Computation-and-Forward With Linear Codes [PDF]
We discuss secure transmission via an untrusted relay when we have a multiple access phase from two nodes to the relay and broadcast phase from the relay to the two nodes. To realize the security, we construct a code that securely transmits the modulo sum of the messages of two nodes via a multiple access channel.
Masahito Hayashi +2 more
openaire +2 more sources
Vehicular ad hoc networks (VANETs) have stimulated interests in both academic and industry settings. Once deployed, they would bring a new driving experience to drivers.
Xiaohan Yue +5 more
doaj +1 more source

