Signing key exposure resistance

WebIn addition, we introduce a new security definition of RIBFHS with signing key exposure resistance. Then, we employ Agrawal's left–right lattices and delegation technology in … WebApr 1, 2024 · In [15], the key exposure is against the partial decryption key (or transformation key) possessed by the CSP while in this paper we consider the exposure …

Revocable identity-based proxy re-signature against signing key …

WebTY - JOUR A2 - Kapron, Bruce M. AU - Xie, Congge AU - Weng, Jian AU - Wen, Jinming PY - 2024 DA - 2024/01/14 TI - Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices SP - 1743421 VL - 2024 AB - In 2014, a new security definition of a revocable identity-based signature (RIBS) with signing key exposure … WebIn 2014, a new security definition of a revocable identity-based signature (RIBS) with signing key exposure resistance was introduced. Based on this new definition, many scalable … opening trout season michigan https://mycannabistrainer.com

Revocable identity-based proxy re-signature against signing key …

WebIn 2014, a new security definition of a revocable identity-based signature (RIBS) with signing key exposure resistance was introduced. Based on this new... DOAJ is a community … WebSep 15, 2024 · Public key cryptography is a major branch of modern cryptography and forms the foundation of computer and network security, as well as electronic commerce. It is a fantastic and fast evolving research area. New public key cryptographic technologies and systems, such as identity-based, attributed-based and functional cryptosystems, have … ipad 6th generation otterbox case

Scalable Revocable Identity-Based Signature Scheme with Signing …

Category:ResearchGate

Tags:Signing key exposure resistance

Signing key exposure resistance

Revocable attribute-based encryption with decryption key exposure …

WebMar 31, 2024 · Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance. Inf. Sci. 594: 249-263 (2024) 2024 [j5] view. electronic edition via DOI; ... Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices. Secur. Commun. Networks 2024: 1743421:1-1743421:11 (2024 ... Webdigital signatures can be combined with passwords [1, 2], smart cards [3], biometrics [4], cha-otic parallel keyed hash functions [5] and other technologies to achieve identity au

Signing key exposure resistance

Did you know?

WebFeb 1, 2024 · Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance @article{Xie2024RevocableIF, title={Revocable identity-based … WebMar 26, 2024 · Abstract. Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into …

WebJan 14, 2024 · In 2014, a new security definition of a revocable identity-based signature (RIBS) with signing key exposure resistance was introduced. Based on this new … WebMay 1, 2024 · In this study, we propose a concrete leveled RIBFHS with signing key exposure resistance. The main contributions of this study are summarized as follows: 1. …

WebSep 10, 2024 · Furthermore, we demonstrate that Hung et al.’s RIBS scheme is vulnerable to signing key exposure attack. To solve these problems, we construct an improved RIBS scheme with strong unforgeability and signing key exposure resistance in the standard model. Compared with previous RIBS schemes without random oracles, ... WebIn this paper, we aim to provide a scalable revocation mechanism for attribute-based signature (ABS). Specifically, we first formally define the syntax of revocable ABS (RABS), …

WebMar 26, 2024 · Abstract. Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy ...

WebGenerally, signature schemes that are secure against key exposure attacks present a limited window of time within which the attacker can produce a valid forgery, e.g., the time period when key exposure occurs in the case of [13,14,20–22]. Moreover, the requirement to update keys/algorithms may alert an attacker to an unsuccessful key exposure ... opening trust bank account rulesWebDec 19, 2024 · The key exposure is a serious threat for the security of data integrity auditing. Once the user's private key for auditing is exposed, most of the existing data integrity … ipad 6th generation pinkWebMar 26, 2024 · Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature unde opening t shirt for hotelsWebMar 26, 2024 · Lian et al. proposed a revocable attribute-based signature scheme, but Wei et al. revealed that Lian et al.’s scheme is vulnerable to signing key exposure. If a signature … opening tsb bank accountWebMay 1, 2024 · In addition, we introduce a new security definition of RIBFHS with signing key exposure resistance. Then, we employ Agrawal’s left–right lattices and delegation … ipad 6th generation user manual pdfWebWe reviewed existing lattice-based RIBS schemes and found that all these schemes are vulnerable to signing key exposure. Hence, in this paper, we propose the first lattice … ipad 6th generation problemsWebApr 17, 2024 · Then, we propose a scalable RIBS scheme with signing key exposure resistance by combining the complete subtree method with Galindo and Garcia’s IBS … opening tube read for thomas