Signing key exposure resistance

WebMay 1, 2015 · If a signature scheme can resist the signing key exposure attack, then the users store their secret keys on physical devices with relatively high security levels, while the update keys can be ... WebFeb 11, 2016 · Abstract: Key-exposure resistance has always been an important issue for in-depth cyber defence in many security applications. Recently, how to deal with the key exposure problem in the settings of cloud storage auditing has been proposed and studied. To address the challenge, existing solutions all require the client to update his secret keys …

Scalable Revocable Identity-Based Signature Scheme with Signing …

Weber a signing key exposure attack and cannot withstand this attack. Furthermore, we propose an improved RIBS scheme that provides strong unforgeability and signing key exposure resistance in the standard mod-el. In addition, the analysis results indicate that our scheme has higher computational performance and security. 2. Preliminaries Webdigital signatures can be combined with passwords [1, 2], smart cards [3], biometrics [4], cha-otic parallel keyed hash functions [5] and other technologies to achieve identity au first watch wesley chapel https://vip-moebel.com

Revocable identity-based proxy re-signature against signing key …

WebMay 1, 2024 · In addition, we introduce a new security definition of RIBFHS with signing key exposure resistance. Then, we employ Agrawal’s left–right lattices and delegation … Websize, and the revocation mechanism with public channels. However, the KGC’s overhead increases linearly with the number of users, which results in issues with scalability. Moreo WebApr 1, 2024 · In [15], the key exposure is against the partial decryption key (or transformation key) possessed by the CSP while in this paper we consider the exposure … camping car park villefranche sur saône

Enabling cloud storage auditing with key-exposure resilience …

Category:Revocable identity-based proxy re-signature against signing key …

Tags:Signing key exposure resistance

Signing key exposure resistance

Efficient Identity-Based Data Integrity Auditing with Key-Exposure ...

WebMar 26, 2024 · Lian et al. proposed a revocable attribute-based signature scheme, but Wei et al. revealed that Lian et al.’s scheme is vulnerable to signing key exposure. If a signature … WebIn addition, we introduce a new security definition of RIBFHS with signing key exposure resistance. Then, we employ Agrawal's left–right lattices and delegation technology in …

Signing key exposure resistance

Did you know?

Web13 hours ago · In fact, copper mining deals exceeded gold mining deals in total value last year, according to a new report by S&P Global. M&A work among copper companies in 2024 totaled more than $14 billion in ... WebIn 2014, a new security definition of a revocable identity-based signature (RIBS) with signing key exposure resistance was introduced. Based on this new... DOAJ is a community …

WebFeb 5, 2015 · Cloud storage auditing is viewed as an important service to verify the integrity of the data in public cloud. Current auditing protocols are all based on the assumption that the client's secret key for auditing is absolutely secure. However, such assumption may not always be held, due to the possibly weak sense of security and/or low security settings at … WebApr 17, 2024 · Then, we propose a scalable RIBS scheme with signing key exposure resistance by combining the complete subtree method with Galindo and Garcia’s IBS …

WebSep 10, 2024 · Furthermore, we demonstrate that Hung et al.’s RIBS scheme is vulnerable to signing key exposure attack. To solve these problems, we construct an improved RIBS scheme with strong unforgeability and signing key exposure resistance in the standard model. Compared with previous RIBS schemes without random oracles, ... WebFeb 1, 2024 · Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance @article{Xie2024RevocableIF, title={Revocable identity-based …

WebIn 2014, a new security definition of a revocable identity-based signature (RIBS) with signing key exposure resistance was introduced. Based on this new definition, many scalable …

WebDec 19, 2024 · The key exposure is a serious threat for the security of data integrity auditing. Once the user's private key for auditing is exposed, most of the existing data integrity … camping car poids lourd mercedesfirst watch wesley chapel floridaWebSep 15, 2024 · Public key cryptography is a major branch of modern cryptography and forms the foundation of computer and network security, as well as electronic commerce. It is a fantastic and fast evolving research area. New public key cryptographic technologies and systems, such as identity-based, attributed-based and functional cryptosystems, have … camping car poids lourd d\u0027occasionWebMar 26, 2024 · Lian et al. proposed a revocable attribute-based signature scheme, but Wei et al. revealed that Lian et al.’s scheme is vulnerable to signing key exposure. If a signature scheme can resist the signing key exposure attack, then the users store their secret keys on physical devices with relatively high security levels, while the update keys can ... camping car poids lourd allemandWebFeb 1, 2024 · Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance @article{Xie2024RevocableIF, title={Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance}, author={Congge Xie and Jian Weng and Dehua Zhou}, journal={Inf. Sci.}, year={2024}, volume={594}, … first watch wesley chapel flWebMay 1, 2015 · If a signature scheme can resist the signing key exposure attack, then the users store their secret keys on physical devices with relatively high security levels, while … camping car petit budgetWebMar 26, 2024 · Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature unde first watch wesley chapel menu