In 2001, Itkis and Reyzin proposed the first forward-secure signature scheme in which both the signing and the verifying are as efficient as the underlying ordinary signature scheme. However, their method will require to generate many larger primes for keys, and key update algorithm is very slow, making it impractical for some applications. This paper proposes a new efficient method to implement the forward-secure signature. The proposed method can solve the problem raised by Itkis and Reyzin’s scheme of finding many larger primes and the efficiency of this method is the same as the underlying signature scheme. In the proposed scheme, no modular exponentiation and inverse computations are required for the key update algorithm. Moreover, onl...
In this paper, we propose a method for enhancing the security of Abdalla and Reyzin’s forward secure...
We propose an efficient generic construction of forward-secure identity-based signature (FSIBS) that...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
[[abstract]]In 2001, Itkis and Reyzin proposed the first forward-secure signature scheme in which bo...
Abstract. We propose the first forward-secure signature scheme for which both signing and verifying ...
Abstract. In this paper, we present two forward secure signature schemes based on gap Diffie-Hellman...
Abstract We describe a digital signature scheme in which the public key is fixed but the secret sign...
Abstract. The devastating consequence of secret key exposure in digital signature is that any signat...
Abstract In this paper we propose a new strong and perfectly key-insulated signature scheme, more ef...
We describe a digital signature scheme in which the public key is xed but the secret signing key is ...
We put forward a new abstraction for achieving forward-secure signatures that are (1) short, (2) hav...
xcyin yzu.edu.cn Abstract-Signcryption scheme combines digital signature and encryption functions. I...
In this paper, we propose a fast signature scheme which is derived from three-pass identification sc...
Abstract—Forward-secure signatures are proposed to tackle the key exposure problem, in which the sec...
Key-evolving protocols aim at limiting damages when an attacker obtains full access to the signer's ...
In this paper, we propose a method for enhancing the security of Abdalla and Reyzin’s forward secure...
We propose an efficient generic construction of forward-secure identity-based signature (FSIBS) that...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
[[abstract]]In 2001, Itkis and Reyzin proposed the first forward-secure signature scheme in which bo...
Abstract. We propose the first forward-secure signature scheme for which both signing and verifying ...
Abstract. In this paper, we present two forward secure signature schemes based on gap Diffie-Hellman...
Abstract We describe a digital signature scheme in which the public key is fixed but the secret sign...
Abstract. The devastating consequence of secret key exposure in digital signature is that any signat...
Abstract In this paper we propose a new strong and perfectly key-insulated signature scheme, more ef...
We describe a digital signature scheme in which the public key is xed but the secret signing key is ...
We put forward a new abstraction for achieving forward-secure signatures that are (1) short, (2) hav...
xcyin yzu.edu.cn Abstract-Signcryption scheme combines digital signature and encryption functions. I...
In this paper, we propose a fast signature scheme which is derived from three-pass identification sc...
Abstract—Forward-secure signatures are proposed to tackle the key exposure problem, in which the sec...
Key-evolving protocols aim at limiting damages when an attacker obtains full access to the signer's ...
In this paper, we propose a method for enhancing the security of Abdalla and Reyzin’s forward secure...
We propose an efficient generic construction of forward-secure identity-based signature (FSIBS) that...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...