[[abstract]]In 2001, Itkis and Reyzin proposed the first forward-secure signature scheme in which both the signing and the verifying are as efficient as the underlying ordinary signature scheme. However,their method will require to generate many larger primes for keys, and key update algorithm is very slow, making it impractical for some applications. This paper proposes a new efficient method to implement the forward-secure signature. The proposed method can solve the problem raised by Itkis and Reyzin?s scheme of finding many larger primes and the efficiency of this method is the same as the underlying signature scheme. In the proposed scheme, no modular exponentiation and inverse computations are required for the key update algorithm. Mo...
AbstractWe propose the concept of fine-grained forward-secure signature schemes. Such signature sche...
xcyin yzu.edu.cn Abstract-Signcryption scheme combines digital signature and encryption functions. I...
Abstract—Forward-secure signatures are proposed to tackle the key exposure problem, in which the sec...
In 2001, Itkis and Reyzin proposed the first forward-secure signature scheme in which both the signi...
Abstract. We propose the first forward-secure signature scheme for which both signing and verifying ...
Abstract. In this paper, we present two forward secure signature schemes based on gap Diffie-Hellman...
Abstract We describe a digital signature scheme in which the public key is fixed but the secret sign...
Abstract. The devastating consequence of secret key exposure in digital signature is that any signat...
We put forward a new abstraction for achieving forward-secure signatures that are (1) short, (2) hav...
Abstract In this paper we propose a new strong and perfectly key-insulated signature scheme, more ef...
In this paper, we propose a fast signature scheme which is derived from three-pass identification sc...
We describe a digital signature scheme in which the public key is xed but the secret signing key is ...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
Key-evolving protocols aim at limiting damages when an attacker obtains full access to the signer's ...
We propose an efficient generic construction of forward-secure identity-based signature (FSIBS) that...
AbstractWe propose the concept of fine-grained forward-secure signature schemes. Such signature sche...
xcyin yzu.edu.cn Abstract-Signcryption scheme combines digital signature and encryption functions. I...
Abstract—Forward-secure signatures are proposed to tackle the key exposure problem, in which the sec...
In 2001, Itkis and Reyzin proposed the first forward-secure signature scheme in which both the signi...
Abstract. We propose the first forward-secure signature scheme for which both signing and verifying ...
Abstract. In this paper, we present two forward secure signature schemes based on gap Diffie-Hellman...
Abstract We describe a digital signature scheme in which the public key is fixed but the secret sign...
Abstract. The devastating consequence of secret key exposure in digital signature is that any signat...
We put forward a new abstraction for achieving forward-secure signatures that are (1) short, (2) hav...
Abstract In this paper we propose a new strong and perfectly key-insulated signature scheme, more ef...
In this paper, we propose a fast signature scheme which is derived from three-pass identification sc...
We describe a digital signature scheme in which the public key is xed but the secret signing key is ...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
Key-evolving protocols aim at limiting damages when an attacker obtains full access to the signer's ...
We propose an efficient generic construction of forward-secure identity-based signature (FSIBS) that...
AbstractWe propose the concept of fine-grained forward-secure signature schemes. Such signature sche...
xcyin yzu.edu.cn Abstract-Signcryption scheme combines digital signature and encryption functions. I...
Abstract—Forward-secure signatures are proposed to tackle the key exposure problem, in which the sec...