Bilateral-secure Signature by Key Evolving
Abstract
References
Index Terms
- Bilateral-secure Signature by Key Evolving
Recommendations
Forward-secure identity-based signature: Security notions and construction
The security of traditional identity-based signatures wholly depends on the security of secret keys. Exposure of secret keys requires reissuing all previously assigned signatures. This limitation becomes more obvious today as key exposure is more common ...
Forward Secure Proxy Blind Signature Scheme
INCOS '11: Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative SystemsThere is no forward security in any proxy blind signature schemes today. The lack of forward security will impact the system security tremendously if the key is stolen. To avoid such a security problem this paper proposes a forward secure proxy blind ...
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments
Forward-secure signatures are proposed to diminish the damage of key exposure, in which the security of signatures prior to the period of key exposure can be kept. Identity-based signatures can reduce the complexity and the cost for managing the public ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chair:
- Xiaofeng Chen,
- Program Chairs:
- XiaoFeng Wang,
- Xinyi Huang
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- Fundamental Research Funds for the Central Universities
- Tencent Rhinoceros Birds Scientific Research Foundation
- Fundamental Research Funds for the Shenzhen University
- National Natural Science Foundation of China
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 152Total Downloads
- Downloads (Last 12 months)11
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in