Cryptographic computations are often carried out on insecure devices for which the threat of key exposure raises a serious concern. In an effort to address the key exposure problem, the notion of forward security was first presented by Günther in 1990. In a forward-secure scheme, secret keys are updated at regular periods of time; exposure of the secret key corresponding to a given time period does not enable an adversary to ‘break’ the scheme for any prior time period. In this paper, we first introduce forward security into certificate-based cryptography and define the security model of forward-secure certificate-based signatures (CBSs). Then we propose a forward-secure CBS scheme, which is shown to be secure against adaptive chosen messag...
AbstractWe propose the concept of fine-grained forward-secure signature schemes. Such signature sche...
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based ...
We present a generic, yet simple and efficient transformation to obtain a forward secure authenticat...
Cryptographic computations are often carried out on insecure devices for which the threat of key exp...
Cryptographic computations are often carried out on insecure devices for which the threat of key exp...
Current signature and encryption schemes secure against continual leakage fail completely if the key...
Abstract. The devastating consequence of secret key exposure in digital signature is that any signat...
We consider the usage of forward security with threshold signature schemes. This means that even if...
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certif...
In the attribute-based encryption (ABE) model, attributes (as opposed to identities) are used to enc...
Abstract We describe a digital signature scheme in which the public key is fixed but the secret sign...
We describe a digital signature scheme in which the public key is xed but the secret signing key is ...
Key-evolving protocols aim at limiting damages when an attacker obtains full access to the signer's ...
Abstract. In this paper, we present two forward secure signature schemes based on gap Diffie-Hellman...
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certif...
AbstractWe propose the concept of fine-grained forward-secure signature schemes. Such signature sche...
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based ...
We present a generic, yet simple and efficient transformation to obtain a forward secure authenticat...
Cryptographic computations are often carried out on insecure devices for which the threat of key exp...
Cryptographic computations are often carried out on insecure devices for which the threat of key exp...
Current signature and encryption schemes secure against continual leakage fail completely if the key...
Abstract. The devastating consequence of secret key exposure in digital signature is that any signat...
We consider the usage of forward security with threshold signature schemes. This means that even if...
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certif...
In the attribute-based encryption (ABE) model, attributes (as opposed to identities) are used to enc...
Abstract We describe a digital signature scheme in which the public key is fixed but the secret sign...
We describe a digital signature scheme in which the public key is xed but the secret signing key is ...
Key-evolving protocols aim at limiting damages when an attacker obtains full access to the signer's ...
Abstract. In this paper, we present two forward secure signature schemes based on gap Diffie-Hellman...
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certif...
AbstractWe propose the concept of fine-grained forward-secure signature schemes. Such signature sche...
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based ...
We present a generic, yet simple and efficient transformation to obtain a forward secure authenticat...