Filters








316 Hits in 4.4 sec

Secure Group Communication with Distributed Generation of Private Keys for Ad-Hoc Networks [chapter]

Shrikant Sundaram, Peter Bertok, Benjamin Burton
2005 IFIP Advances in Information and Communication Technology  
This paper proposes a fast, scalable group encryption key model that is suitable for ad-hoc networks and is resistant against multiple compromised nodes. key-insulated, ad hoc networks, key generation,  ...  With the increase of group-oriented applications, secure communication has to be provided between a group of nodes that may join and leave the network in an unplanned manner.  ...  We assume that the reader is familiar with threshold cryptography; in the next section we explain the key insulated scheme that forms the basis of our solution. 2.2 Key-Insulated Cryptography and Signature  ... 
doi:10.1007/0-387-25660-1_31 fatcat:kct4fdytwvh6pcpzjzyierrriq

A Pairing-free Key-insulated Certificate-based Signature Scheme with Provable Security

2015 KSII Transactions on Internet and Information Systems  
To resist the threat of key leakage, we present a pairing-free key insulated CBS scheme by incorporating the idea of key insulated mechanism and CBS.  ...  Our scheme eliminates the costly pairing operations and as a matter of fact outperforms the existing key insulated CBS schemes. It is more suitable for low-power devices.  ...  Our key insulated CBS scheme can offer secure key-updates.  ... 
doi:10.3837/tiis.2015.03.023 fatcat:t27tsv2ncjfxbivlb463asrnh4

Revocable Cloud-Assisted Attribute-Based Signcryption In Personal Health System

Fuhu Deng, Yali Wang, Li Peng, Miao Lai, Ji Geng
2019 IEEE Access  
broadcast encryption technology and key segmentation technology realize user revocation function.  ...  INDEX TERMS Cloud computing, attribute-based signcryption, verifiable outsourcing technology, user revocation function, server-assisted signature.  ...  In addition, since the RCS-ABSC scheme is the first time to implement revocation function in attribute-based signcryption scheme, the selected scheme '' [44] + [45] '' is compared with our scheme.  ... 
doi:10.1109/access.2019.2933636 fatcat:m2s33qbo7bcjno7ff4ljzjpxo4

Strong mobile device protection from loss and capture

Zhengyi Le, Matt Bishop, Fillia Makedon
2009 Proceedings of the 2nd International Conference on PErvsive Technologies Related to Assistive Environments - PETRA '09  
forward secure signature scheme.  ...  Even if he compromises both key shares simultaneously, the digital signatures generated by previous private keys are still secure.  ...  Section 6 discuss other benefits, such as fast revocation and server witness, the selection of refresh frequency, and promising applications.  ... 
doi:10.1145/1579114.1579144 dblp:conf/petra/LeBM09 fatcat:4skouhmeangsrjrp54df6uganu

Revocable Identity-Based Encryption Revisited: Security Model and Construction [chapter]

Jae Hong Seo, Keita Emura
2013 Lecture Notes in Computer Science  
Keywords: Identity-based encryption with revocation, decryption key exposure. IDs on each time period T via secure channels. 1 We call the Boneh-Franklin revocable IBE (RIBE) scheme BF-RIBE.  ...  In ACM CCS 2008, Boldyreva et al. proposed an elegant way of achieving an Identity-based Encryption (IBE) with efficient revocation, which we call revocable IBE (RIBE).  ...  It would be interesting to construct a RIBE scheme with decryption key exposure resilience and short public parameters in the prime-order group setting.  ... 
doi:10.1007/978-3-642-36362-7_14 fatcat:wntxttb33nednb7lnc5huavyqu

Fine-grained forward-secure signature schemes without random oracles

Jan Camenisch, Maciej Koprowski
2006 Discrete Applied Mathematics  
with a new key.  ...  Such signature schemes not only provide nonrepudiation w.r.t. past time periods the way ordinary forward-secure signature schemes do but, in addition, allow the signer to specify which signatures of the  ...  Moreover, as a side-effect, we have also constructed a new ordinary forward-secure signature scheme, hitherto the most efficient among such schemes which are provably secure.  ... 
doi:10.1016/j.dam.2005.03.028 fatcat:eyd2p4ev2vhgzetacfd3u5ob2i

Application Authentication System with Efficiently Updatable Signature

Kazuto OGAWA, Go OHTAKE
2016 IEICE transactions on information and systems  
Concretely, we modify a key-insulated signature scheme and apply it to this protocol.  ...  , ID-based signature, key-insulated signature  ...  We would also like to thank Goichiro Hanaoka for a lot of discussions and suggestions on the signature schemes.  ... 
doi:10.1587/transinf.2015mup0008 fatcat:5g34xzc7sbgsnikpp5cmyhpqoa

Preventing Unofficial Information Propagation [chapter]

Zhengyi Le, Yi Ouyang, Yurong Xu, James Ford, Fillia Makedon
2007 Lecture Notes in Computer Science  
When someone (or some group), who has stolen, leaked, copied, or manipulated digital documents propagates the documents over the Internet and/or distributes those through physical distribution channels  ...  The proposed approach in this paper uses shortlived credentials based on reverse forward secure signatures to remove this assumption and mitigate the damage caused by a dishonest or honest but compromised  ...  This paper approaches this problem with two schemes-interactive and non-interactive. The basis of our schemes is Forward Secure Signature (FSS) crytosystems.  ... 
doi:10.1007/978-3-540-77048-0_9 fatcat:mum56frjifbndhjnkwdqarjvsu

Ring signature scheme based on multivariate public key cryptosystems

Shangping Wang, Rui Ma, Yaling Zhang, Xiaofeng Wang
2011 Computers and Mathematics with Applications  
In this work, we propose a novel ring signature scheme based on multivariate polynomials with the security model for the first time.  ...  The ring signature scheme is an important cryptographic primitive that enables a user to sign a message on behalf of a group in authentic and anonymous way, i.e. the recipient of the message is convinced  ...  A ring signature scheme can be viewed as a group signature scheme with no anonymity revocation and simple group setup.  ... 
doi:10.1016/j.camwa.2011.09.052 fatcat:nmasjynaoncibou73c3wsqvp5i

An Efficient V2I Authentication Scheme for VANETs

Yousheng Zhou, Siling Liu, Min Xiao, Shaojiang Deng, Xiaojun Wang
2018 Mobile Information Systems  
However, key exposure is inevitable on account of the openness of VANET environment. To address this problem, key insulation is introduced in our proposed scheme.  ...  With a helper device, vehicles could periodically update their own secret keys. In this way, the forward and backward secrecy has been achieved.  ...  To address the problem of key exposure, Dodis et al. presented the idea of key insulation and came up with the first key-insulated public key cryptosystem [16] and the first strong key-insulated signature  ... 
doi:10.1155/2018/4070283 fatcat:urehm4xcn5hutjrrabrlch6jc4

A Lightweight Certificate-Based Aggregate Signature Scheme Providing Key Insulation

Yong-Woon Hwang, Im-Yeong Lee
2021 Computers Materials & Continua  
In this proposed method, by providing key insulation, security threats that occur when keys are exposed due to physical attacks such as side channels can be solved.  ...  In this paper, we propose a new lightweight signature scheme that uses a certificate-based aggregate signature and can generate and verify signed messages from IoT devices in an IoT-cloud environment.  ...  and existing schemes Table 1 : 1 Comparison of certificate-based signature, certificate-based aggregate signature, identitybased aggregate signatures schemes Scheme Type Key escrow Aggregate Key insulated  ... 
doi:10.32604/cmc.2021.018549 fatcat:doh6aszdjnazrkcrzk4zcwwmme

A Provably Secure Lightweight Subtree-based Short Signature Scheme with Fuzzy User Data Sharing for Human-Centered IoT

Chandrashekhar Meshram, Ahmed Alsanad, Jitendra V. Tembhurne, Shailendra W. Shende, Kailash W. Kalare, Sarita Gajbhiye Meshram, Muhammad Azeem Akbar, Abdu Gumaei
2020 IEEE Access  
The key challenge in signature-based methods is more incurred computational expense for signing and checking process involving large numbers.  ...  The presented scheme provides assurance of better security than other standing short-signature schemes.  ...  So, key insulation with aggregate signature using IBC is introduced in [18] for mobile devices where bilinear pairing is utilized over elliptic curve environment.  ... 
doi:10.1109/access.2020.3046367 fatcat:pj73p3vvubdjjodpvl73u52m4m

CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts

Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park, Moti Yung, Yi Mu
2018 Computer journal  
As pointed in [14] , SUE can also be used to build time-released encryption (TIE) and key-insulated encryption (KIE) with certain properties.  ...  We then propose an efficient SUE scheme with such CCA security, and we also define similar CCA security for RS-ABE and present an RS-ABE scheme with this CCA security.  ...  However, SUE itself can be used for other interesting applications: timed-release encryption [21] and key-insulated encryption [11] . Revocable IBE and Its Extensions.  ... 
doi:10.1093/comjnl/bxy122 fatcat:4shuzmy2l5bnlfohkhduskudfe

Yet Another Forward Secure Signature from Bilinear Pairings [chapter]

Duc-Liem Vo, Kwangjo Kim
2006 Lecture Notes in Computer Science  
The scheme can perform key evolving for unlimited time periods while maintaining sizes of keys and signature fixed.  ...  We also provide a formal definition along with a detailed security proof of our signature scheme under the assumption of Computational Diffie-Hellman problem.  ...  To deal with the key exposure problem, there are several solutions. The first one may think is to use key revocation mechanism by certificate revocation.  ... 
doi:10.1007/11734727_34 fatcat:iaqgxlcjfvdxfpvvtdddiqitue

G-Merkle: A Hash-Based Group Signature Scheme from Standard Assumptions [chapter]

Rachid El Bansarkhani, Rafael Misoczki
2018 Lecture Notes in Computer Science  
Moreover, for N group members issuing at most B signatures each, the size of a hash-based group signature is just as large as a Merkle signature with a tree composed by N · B leaf nodes.  ...  In this work, we introduce G-Merkle, the first (stateful) hash-based group signature scheme.  ...  One example is the forward secure signature scheme (also proxy-and key-insulated signature schemes) from oneway functions by Buchmann et al. [BDH11] .  ... 
doi:10.1007/978-3-319-79063-3_21 fatcat:4mpqtc4nove3vaqeej2b7ubhpe
« Previous Showing results 1 — 15 out of 316 results