Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- chapterJanuary 2012
Fully forward-secure group signatures
Cryptography and SecurityJanuary 2012, Pages 156–184When embedding cryptographic tools in actual computing systems, it is important to ensure physical layer protection to cryptographic keys. A simple risk analysis shows that taking advantage of system (i.e., hardware, software, network) vulnerabilities ...
- research-articleApril 2010
Dynamic fully forward-secure group signatures
ASIACCS '10: Proceedings of the 5th ACM Symposium on Information, Computer and Communications SecurityPages 70–81https://doi.org/10.1145/1755688.1755698Enhancing user privacy while allowing the use of digital credentials in network-wide applications is a very active area. Group signatures are primary privacy-preserving credentials that enable both, non-repudiation and abuser-tracing.
When embedding ...