24-28Many cryptographic schemes were designed under the assumption that the private keys involved in the system are perfectly secure. If the private key of a signer is exposed then security of the system is totally lost. Key-insulation mechanism minimizes the damage caused by the exposure of private keys in cryptographic schemes. To deal with the key-exposure problem in ID-based schemes, private keys have to be updated at very short intervals; but it will increase the risk of helper key exposure. In order to improve the security and efficiency of key insulation mechanism in ID-based signatures, in this paper, we proposed an ID-based parallel key insulated signature scheme. This scheme uses the bilinear pairings over elliptic curves and is p...
The challenge of providing security for Mobile Ad-hoc Networks (MANETs) due to the inherent problems...
Signcryption schemes are compact and specially suited for efficiency-critical applications such as s...
Abstract. In this paper, we give a first example of identity based undeniable signature using pairin...
Public Key Cryptosystem (PKC) completely relies under the assumption that user’s private key is abso...
To minimize the damage caused by key-exposure in ID-based signatures, in ISPEC’06 Zhou et al (2006) ...
[[abstract]]Recently, the notion of the key-insulated public- key system has been suggested to prote...
To minimize the damage caused by key-exposure in ID-based signatures, in ISPEC’06 Zhou et al (2006) ...
AbstractPrivate key exposure can be the most devastating attack on cryptographic schemes; as such ex...
Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the sec...
We proposed an efficient and secure digital signature scheme using elliptic curve cryptography (ECC)...
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strength...
Abstract. Key-insulated cryptography is a crucial technique for pro-tecting private keys. To strengt...
Since Boneh and Franklin [Advances in cryptology-CRYPTO LNCS 2139 (2001) 213] gave the first feasibl...
Nowadays, the design of new cryptographic schemes follows the modern methodology of provable securi...
In recent years, many applications of elliptic curves to cryptography have been developed. Cryptosy...
The challenge of providing security for Mobile Ad-hoc Networks (MANETs) due to the inherent problems...
Signcryption schemes are compact and specially suited for efficiency-critical applications such as s...
Abstract. In this paper, we give a first example of identity based undeniable signature using pairin...
Public Key Cryptosystem (PKC) completely relies under the assumption that user’s private key is abso...
To minimize the damage caused by key-exposure in ID-based signatures, in ISPEC’06 Zhou et al (2006) ...
[[abstract]]Recently, the notion of the key-insulated public- key system has been suggested to prote...
To minimize the damage caused by key-exposure in ID-based signatures, in ISPEC’06 Zhou et al (2006) ...
AbstractPrivate key exposure can be the most devastating attack on cryptographic schemes; as such ex...
Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the sec...
We proposed an efficient and secure digital signature scheme using elliptic curve cryptography (ECC)...
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strength...
Abstract. Key-insulated cryptography is a crucial technique for pro-tecting private keys. To strengt...
Since Boneh and Franklin [Advances in cryptology-CRYPTO LNCS 2139 (2001) 213] gave the first feasibl...
Nowadays, the design of new cryptographic schemes follows the modern methodology of provable securi...
In recent years, many applications of elliptic curves to cryptography have been developed. Cryptosy...
The challenge of providing security for Mobile Ad-hoc Networks (MANETs) due to the inherent problems...
Signcryption schemes are compact and specially suited for efficiency-critical applications such as s...
Abstract. In this paper, we give a first example of identity based undeniable signature using pairin...