A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure Group Communication with Distributed Generation of Private Keys for Ad-Hoc Networks
[chapter]
2005
IFIP Advances in Information and Communication Technology
This paper proposes a fast, scalable group encryption key model that is suitable for ad-hoc networks and is resistant against multiple compromised nodes. key-insulated, ad hoc networks, key generation, ...
With the increase of group-oriented applications, secure communication has to be provided between a group of nodes that may join and leave the network in an unplanned manner. ...
We assume that the reader is familiar with threshold cryptography; in the next section we explain the key insulated scheme that forms the basis of our solution.
2.2 Key-Insulated Cryptography and Signature ...
doi:10.1007/0-387-25660-1_31
fatcat:kct4fdytwvh6pcpzjzyierrriq
A Pairing-free Key-insulated Certificate-based Signature Scheme with Provable Security
2015
KSII Transactions on Internet and Information Systems
To resist the threat of key leakage, we present a pairing-free key insulated CBS scheme by incorporating the idea of key insulated mechanism and CBS. ...
Our scheme eliminates the costly pairing operations and as a matter of fact outperforms the existing key insulated CBS schemes. It is more suitable for low-power devices. ...
Our key insulated CBS scheme can offer secure key-updates. ...
doi:10.3837/tiis.2015.03.023
fatcat:t27tsv2ncjfxbivlb463asrnh4
Revocable Cloud-Assisted Attribute-Based Signcryption In Personal Health System
2019
IEEE Access
broadcast encryption technology and key segmentation technology realize user revocation function. ...
INDEX TERMS Cloud computing, attribute-based signcryption, verifiable outsourcing technology, user revocation function, server-assisted signature. ...
In addition, since the RCS-ABSC scheme is the first time to implement revocation function in attribute-based signcryption scheme, the selected scheme '' [44] + [45] '' is compared with our scheme. ...
doi:10.1109/access.2019.2933636
fatcat:m2s33qbo7bcjno7ff4ljzjpxo4
Strong mobile device protection from loss and capture
2009
Proceedings of the 2nd International Conference on PErvsive Technologies Related to Assistive Environments - PETRA '09
forward secure signature scheme. ...
Even if he compromises both key shares simultaneously, the digital signatures generated by previous private keys are still secure. ...
Section 6 discuss other benefits, such as fast revocation and server witness, the selection of refresh frequency, and promising applications. ...
doi:10.1145/1579114.1579144
dblp:conf/petra/LeBM09
fatcat:4skouhmeangsrjrp54df6uganu
Revocable Identity-Based Encryption Revisited: Security Model and Construction
[chapter]
2013
Lecture Notes in Computer Science
Keywords: Identity-based encryption with revocation, decryption key exposure. IDs on each time period T via secure channels. 1 We call the Boneh-Franklin revocable IBE (RIBE) scheme BF-RIBE. ...
In ACM CCS 2008, Boldyreva et al. proposed an elegant way of achieving an Identity-based Encryption (IBE) with efficient revocation, which we call revocable IBE (RIBE). ...
It would be interesting to construct a RIBE scheme with decryption key exposure resilience and short public parameters in the prime-order group setting. ...
doi:10.1007/978-3-642-36362-7_14
fatcat:wntxttb33nednb7lnc5huavyqu
Fine-grained forward-secure signature schemes without random oracles
2006
Discrete Applied Mathematics
with a new key. ...
Such signature schemes not only provide nonrepudiation w.r.t. past time periods the way ordinary forward-secure signature schemes do but, in addition, allow the signer to specify which signatures of the ...
Moreover, as a side-effect, we have also constructed a new ordinary forward-secure signature scheme, hitherto the most efficient among such schemes which are provably secure. ...
doi:10.1016/j.dam.2005.03.028
fatcat:eyd2p4ev2vhgzetacfd3u5ob2i
Application Authentication System with Efficiently Updatable Signature
2016
IEICE transactions on information and systems
Concretely, we modify a key-insulated signature scheme and apply it to this protocol. ...
, ID-based signature, key-insulated signature ...
We would also like to thank Goichiro Hanaoka for a lot of discussions and suggestions on the signature schemes. ...
doi:10.1587/transinf.2015mup0008
fatcat:5g34xzc7sbgsnikpp5cmyhpqoa
Preventing Unofficial Information Propagation
[chapter]
2007
Lecture Notes in Computer Science
When someone (or some group), who has stolen, leaked, copied, or manipulated digital documents propagates the documents over the Internet and/or distributes those through physical distribution channels ...
The proposed approach in this paper uses shortlived credentials based on reverse forward secure signatures to remove this assumption and mitigate the damage caused by a dishonest or honest but compromised ...
This paper approaches this problem with two schemes-interactive and non-interactive. The basis of our schemes is Forward Secure Signature (FSS) crytosystems. ...
doi:10.1007/978-3-540-77048-0_9
fatcat:mum56frjifbndhjnkwdqarjvsu
Ring signature scheme based on multivariate public key cryptosystems
2011
Computers and Mathematics with Applications
In this work, we propose a novel ring signature scheme based on multivariate polynomials with the security model for the first time. ...
The ring signature scheme is an important cryptographic primitive that enables a user to sign a message on behalf of a group in authentic and anonymous way, i.e. the recipient of the message is convinced ...
A ring signature scheme can be viewed as a group signature scheme with no anonymity revocation and simple group setup. ...
doi:10.1016/j.camwa.2011.09.052
fatcat:nmasjynaoncibou73c3wsqvp5i
An Efficient V2I Authentication Scheme for VANETs
2018
Mobile Information Systems
However, key exposure is inevitable on account of the openness of VANET environment. To address this problem, key insulation is introduced in our proposed scheme. ...
With a helper device, vehicles could periodically update their own secret keys. In this way, the forward and backward secrecy has been achieved. ...
To address the problem of key exposure, Dodis et al. presented the idea of key insulation and came up with the first key-insulated public key cryptosystem [16] and the first strong key-insulated signature ...
doi:10.1155/2018/4070283
fatcat:urehm4xcn5hutjrrabrlch6jc4
A Lightweight Certificate-Based Aggregate Signature Scheme Providing Key Insulation
2021
Computers Materials & Continua
In this proposed method, by providing key insulation, security threats that occur when keys are exposed due to physical attacks such as side channels can be solved. ...
In this paper, we propose a new lightweight signature scheme that uses a certificate-based aggregate signature and can generate and verify signed messages from IoT devices in an IoT-cloud environment. ...
and existing schemes
Table 1 : 1 Comparison of certificate-based signature, certificate-based aggregate signature, identitybased aggregate signatures schemes Scheme Type Key escrow Aggregate Key insulated ...
doi:10.32604/cmc.2021.018549
fatcat:doh6aszdjnazrkcrzk4zcwwmme
A Provably Secure Lightweight Subtree-based Short Signature Scheme with Fuzzy User Data Sharing for Human-Centered IoT
2020
IEEE Access
The key challenge in signature-based methods is more incurred computational expense for signing and checking process involving large numbers. ...
The presented scheme provides assurance of better security than other standing short-signature schemes. ...
So, key insulation with aggregate signature using IBC is introduced in [18] for mobile devices where bilinear pairing is utilized over elliptic curve environment. ...
doi:10.1109/access.2020.3046367
fatcat:pj73p3vvubdjjodpvl73u52m4m
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts
2018
Computer journal
As pointed in [14] , SUE can also be used to build time-released encryption (TIE) and key-insulated encryption (KIE) with certain properties. ...
We then propose an efficient SUE scheme with such CCA security, and we also define similar CCA security for RS-ABE and present an RS-ABE scheme with this CCA security. ...
However, SUE itself can be used for other interesting applications: timed-release encryption [21] and key-insulated encryption [11] . Revocable IBE and Its Extensions. ...
doi:10.1093/comjnl/bxy122
fatcat:4shuzmy2l5bnlfohkhduskudfe
Yet Another Forward Secure Signature from Bilinear Pairings
[chapter]
2006
Lecture Notes in Computer Science
The scheme can perform key evolving for unlimited time periods while maintaining sizes of keys and signature fixed. ...
We also provide a formal definition along with a detailed security proof of our signature scheme under the assumption of Computational Diffie-Hellman problem. ...
To deal with the key exposure problem, there are several solutions. The first one may think is to use key revocation mechanism by certificate revocation. ...
doi:10.1007/11734727_34
fatcat:iaqgxlcjfvdxfpvvtdddiqitue
G-Merkle: A Hash-Based Group Signature Scheme from Standard Assumptions
[chapter]
2018
Lecture Notes in Computer Science
Moreover, for N group members issuing at most B signatures each, the size of a hash-based group signature is just as large as a Merkle signature with a tree composed by N · B leaf nodes. ...
In this work, we introduce G-Merkle, the first (stateful) hash-based group signature scheme. ...
One example is the forward secure signature scheme (also proxy-and key-insulated signature schemes) from oneway functions by Buchmann et al. [BDH11] . ...
doi:10.1007/978-3-319-79063-3_21
fatcat:4mpqtc4nove3vaqeej2b7ubhpe
« Previous
Showing results 1 — 15 out of 316 results