We consider the usage of forward security with threshold signature schemes. This means that even if more than the threshold number of players are compromised, some security remains: it is not possible to forge signatures relating to the past. In this paper, we describe the first forward-secure threshold signature schemes whose parameters (other than signing or verifying time) do not vary in length with the number of time periods in the scheme. Both are threshold versions of the Bellare-Miner forward-secure signature scheme, which is Fiat-Shamir-based. One scheme uses multiplicative secret sharing, and tolerates mobile eavesdropping adversaries. The second scheme is based on polynomial secret sharing, and we prove it forward-secure based ...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
Key-evolving protocols aim at limiting damages when an attacker obtains full access to the signer's ...
We put forward a new abstraction for achieving forward-secure signatures that are (1) short, (2) hav...
CHANATHIP NAMPREMPRE We consider the usage of forward security with threshold signature schemes. Thi...
Abstract. The devastating consequence of secret key exposure in digital signature is that any signat...
Abstract—Forward-secure signatures are proposed to tackle the key exposure problem, in which the sec...
The devastating consequence of secret key exposure in digital signature is that any signature can be...
Cryptographic computations are often carried out on insecure devices for which the threat of key exp...
Abstract We describe a digital signature scheme in which the public key is fixed but the secret sign...
Current signature and encryption schemes secure against continual leakage fail completely if the key...
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer ...
We describe a digital signature scheme in which the public key is xed but the secret signing key is ...
AbstractWe present threshold DSS (digital signature standard) signatures where the power to sign is ...
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based ...
Cryptographic computations are often carried out on insecure devices for which the threat of key exp...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
Key-evolving protocols aim at limiting damages when an attacker obtains full access to the signer's ...
We put forward a new abstraction for achieving forward-secure signatures that are (1) short, (2) hav...
CHANATHIP NAMPREMPRE We consider the usage of forward security with threshold signature schemes. Thi...
Abstract. The devastating consequence of secret key exposure in digital signature is that any signat...
Abstract—Forward-secure signatures are proposed to tackle the key exposure problem, in which the sec...
The devastating consequence of secret key exposure in digital signature is that any signature can be...
Cryptographic computations are often carried out on insecure devices for which the threat of key exp...
Abstract We describe a digital signature scheme in which the public key is fixed but the secret sign...
Current signature and encryption schemes secure against continual leakage fail completely if the key...
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer ...
We describe a digital signature scheme in which the public key is xed but the secret signing key is ...
AbstractWe present threshold DSS (digital signature standard) signatures where the power to sign is ...
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based ...
Cryptographic computations are often carried out on insecure devices for which the threat of key exp...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
Key-evolving protocols aim at limiting damages when an attacker obtains full access to the signer's ...
We put forward a new abstraction for achieving forward-secure signatures that are (1) short, (2) hav...