We put forward a new abstraction for achieving forward-secure signatures that are (1) short, (2) have fast update and signing and (3) have small private key size. Prior work that achieved these parameters was pioneered by the pebbling techniques of Itkis and Reyzin (CRYPTO 2001) which showed a process for generating a sequence of roots $h^{1/e_1}, h^{1/e_2}, \dots, h^{1/e_T}$ for a group element $h$ in $\mathbb{Z}_N^*$. However, the current state of the art has limitations. First, while many works claim that Itkis-Reyzin pebbling can be applied, it is seldom shown how this non-trivial step is concretely done. Second, setting up the pebbling data structure takes $T$ time which makes key generation using this approach expensive. Third, many...
Current signature and encryption schemes secure against continual leakage fail completely if the key...
This work presents mathematical properties of the RSA cryptosystem. The topics of backdoors and padd...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
AbstractWe propose the concept of fine-grained forward-secure signature schemes. Such signature sche...
[[abstract]]In 2001, Itkis and Reyzin proposed the first forward-secure signature scheme in which bo...
We present a generic, yet simple and efficient transformation to obtain a forward secure authenticat...
Ordinary digital signatures have an inherent weakness: if the secret key is leaked, then all signatu...
We present a new robust proactive (and threshold) RSA signature scheme secure with the optimal thres...
We consider the usage of forward security with threshold signature schemes. This means that even if...
Abstract We describe a digital signature scheme in which the public key is fixed but the secret sign...
We describe a digital signature scheme in which the public key is xed but the secret signing key is ...
Cryptographic computations are often carried out on insecure devices for which the threat of key exp...
Abstract. The devastating consequence of secret key exposure in digital signature is that any signat...
Key-evolving protocols aim at limiting damages when an attacker obtains full access to the signer's ...
Abstract. In this paper, we present two forward secure signature schemes based on gap Diffie-Hellman...
Current signature and encryption schemes secure against continual leakage fail completely if the key...
This work presents mathematical properties of the RSA cryptosystem. The topics of backdoors and padd...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
AbstractWe propose the concept of fine-grained forward-secure signature schemes. Such signature sche...
[[abstract]]In 2001, Itkis and Reyzin proposed the first forward-secure signature scheme in which bo...
We present a generic, yet simple and efficient transformation to obtain a forward secure authenticat...
Ordinary digital signatures have an inherent weakness: if the secret key is leaked, then all signatu...
We present a new robust proactive (and threshold) RSA signature scheme secure with the optimal thres...
We consider the usage of forward security with threshold signature schemes. This means that even if...
Abstract We describe a digital signature scheme in which the public key is fixed but the secret sign...
We describe a digital signature scheme in which the public key is xed but the secret signing key is ...
Cryptographic computations are often carried out on insecure devices for which the threat of key exp...
Abstract. The devastating consequence of secret key exposure in digital signature is that any signat...
Key-evolving protocols aim at limiting damages when an attacker obtains full access to the signer's ...
Abstract. In this paper, we present two forward secure signature schemes based on gap Diffie-Hellman...
Current signature and encryption schemes secure against continual leakage fail completely if the key...
This work presents mathematical properties of the RSA cryptosystem. The topics of backdoors and padd...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...