AbstractWe propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide non-repudiation w.r.t. past time periods the way ordinary forward-secure signature schemes do but, in addition, allow the signer to specify which signatures of the current time period remain valid when revoking the public key. This is an important advantage if the signer produces many signatures per time period as otherwise the signer would have to re-issue those signatures (and possibly re-negotiate the respective messages) with a new key.Apart from a formal model for fine-grained forward-secure signature schemes, we present practical schemes and prove them secure under the strong RSA assumption only, i.e., we do not res...
Abstract. Intrusion-resilient signatures are key-evolving protocols that extend the concepts of forw...
Cryptographic computations are often carried out on insecure devices for which the threat of key exp...
We describe a short signature scheme which is existentially unforgeable under a chosen message attac...
Abstract We describe a digital signature scheme in which the public key is fixed but the secret sign...
We describe a digital signature scheme in which the public key is xed but the secret signing key is ...
Abstract. The devastating consequence of secret key exposure in digital signature is that any signat...
We describe and analyze a new digital signature scheme. The new scheme is quite efficient, does not ...
Abstract We describe and analyze a new digital signature scheme. The new scheme is quite efficient, ...
Abstract. In this paper, we present two forward secure signature schemes based on gap Diffie-Hellman...
International audienceThe Fiat-Shamir paradigm for transforming identification schemes into signatur...
Abstract. We propose the first forward-secure signature scheme for which both signing and verifying ...
We present a generic, yet simple and efficient transformation to obtain a forward secure authenticat...
We put forward a new abstraction for achieving forward-secure signatures that are (1) short, (2) hav...
Abstract This paper considers strong-RSA signature schemes built from the scheme of Cramer and Shoup...
In practice, the greatest threat against the security of a digital signature scheme is the exposure ...
Abstract. Intrusion-resilient signatures are key-evolving protocols that extend the concepts of forw...
Cryptographic computations are often carried out on insecure devices for which the threat of key exp...
We describe a short signature scheme which is existentially unforgeable under a chosen message attac...
Abstract We describe a digital signature scheme in which the public key is fixed but the secret sign...
We describe a digital signature scheme in which the public key is xed but the secret signing key is ...
Abstract. The devastating consequence of secret key exposure in digital signature is that any signat...
We describe and analyze a new digital signature scheme. The new scheme is quite efficient, does not ...
Abstract We describe and analyze a new digital signature scheme. The new scheme is quite efficient, ...
Abstract. In this paper, we present two forward secure signature schemes based on gap Diffie-Hellman...
International audienceThe Fiat-Shamir paradigm for transforming identification schemes into signatur...
Abstract. We propose the first forward-secure signature scheme for which both signing and verifying ...
We present a generic, yet simple and efficient transformation to obtain a forward secure authenticat...
We put forward a new abstraction for achieving forward-secure signatures that are (1) short, (2) hav...
Abstract This paper considers strong-RSA signature schemes built from the scheme of Cramer and Shoup...
In practice, the greatest threat against the security of a digital signature scheme is the exposure ...
Abstract. Intrusion-resilient signatures are key-evolving protocols that extend the concepts of forw...
Cryptographic computations are often carried out on insecure devices for which the threat of key exp...
We describe a short signature scheme which is existentially unforgeable under a chosen message attac...