A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
[chapter]
2004
Lecture Notes in Computer Science
For the last two decades the notion and implementations of proxy signatures have been used to allow transfer of digital signing power within some context (in order to enable flexibility of signers within organizations and among entities). On the other hand, various notions of the key-evolving signature paradigms (forward-secure, key-insulated, and intrusion-resilient signatures) have been suggested in the last few years for protecting the security of signature schemes, localizing the damage of
doi:10.1007/978-3-540-24676-3_19
fatcat:ilwknuqlgbfdxaudsanxxq37ym