Cryptographic computations are often carried out on insecure devices for which the threat of key exposure raises a serious concern. In an effort to address the key exposure problem, the notion of forward security was first presented by Günther in 1990. In a forward-secure scheme, secret keys are updated at regular periods of time; exposure of the secret key corresponding to a given time period does not enable an adversary to ‘break ’ the scheme for any prior time period. In this paper, we first introduce forward security into certificate-based cryptography and define the security model of forward-secure certificate-based signatures (CBSs). Then we propose a forward-secure CBS scheme, which is shown to be secure against adaptive chosen messa...
Certificate-based encryption was introduced in Eurocrypt'03 to solve the certificate management prob...
In this paper we construct and consider a new group-based digital signature scheme with evolving sec...
In practice, the greatest threat against the security of a digital signature scheme is the exposure ...
Cryptographic computations are often carried out on insecure devices for which the threat of key exp...
Current signature and encryption schemes secure against continual leakage fail completely if the key...
Abstract. The devastating consequence of secret key exposure in digital signature is that any signat...
Abstract. In this paper, we present two forward secure signature schemes based on gap Diffie-Hellman...
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certif...
Key-evolving protocols aim at limiting damages when an attacker obtains full access to the signer's ...
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certif...
Abstract We describe a digital signature scheme in which the public key is fixed but the secret sign...
In the attribute-based encryption (ABE) model, attributes (as opposed to identities) are used to enc...
AbstractWe propose the concept of fine-grained forward-secure signature schemes. Such signature sche...
We describe a digital signature scheme in which the public key is xed but the secret signing key is ...
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based ...
Certificate-based encryption was introduced in Eurocrypt'03 to solve the certificate management prob...
In this paper we construct and consider a new group-based digital signature scheme with evolving sec...
In practice, the greatest threat against the security of a digital signature scheme is the exposure ...
Cryptographic computations are often carried out on insecure devices for which the threat of key exp...
Current signature and encryption schemes secure against continual leakage fail completely if the key...
Abstract. The devastating consequence of secret key exposure in digital signature is that any signat...
Abstract. In this paper, we present two forward secure signature schemes based on gap Diffie-Hellman...
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certif...
Key-evolving protocols aim at limiting damages when an attacker obtains full access to the signer's ...
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certif...
Abstract We describe a digital signature scheme in which the public key is fixed but the secret sign...
In the attribute-based encryption (ABE) model, attributes (as opposed to identities) are used to enc...
AbstractWe propose the concept of fine-grained forward-secure signature schemes. Such signature sche...
We describe a digital signature scheme in which the public key is xed but the secret signing key is ...
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based ...
Certificate-based encryption was introduced in Eurocrypt'03 to solve the certificate management prob...
In this paper we construct and consider a new group-based digital signature scheme with evolving sec...
In practice, the greatest threat against the security of a digital signature scheme is the exposure ...