نتایج جستجو برای: public key cryptography
تعداد نتایج: 917476 فیلتر نتایج به سال:
Exposure of secret keys may be the most devastating attack on a public key cryptographic scheme since such that security is entirely lost. The key-insulated security provides a promising approach to deal with this threat since it can effectively mitigate the damage caused by the secret key exposure. To eliminate the cumbersome certificate management in traditional PKIsupported key-insulated sig...
The focus of this paper is to design an efficient and secure solution addressing the key escrow problem in ID-based signature schemes, i.e., the Private Key Generator (PKG) knows the user’s private key, which damages the essential requirement–“non-repudiation” property of signature schemes. In this paper, we proposed two ID-based threshold signature schemes, which both reach Girault’s trusted l...
This paper provides a general treatment of privacy ampliication by public discussion , a concept introduced by Bennett, Brassard and Robert for a special scenario. Privacy ampliication is a protocol that allows two parties to distill a secret key from a common random variable that is only partially secret, i.e. about which an eavesdropper has some partial information , where the two parties gen...
Securing a wireless communication has generally a vital importance, particularly when this communication is in a hostile environment like in wireless sensor networks (WSNs). The problem is how to create cryptographic keys between sensor nodes to ensure secure communications. Limited resources of sensor nodes make a public key cryptosystem such as RSA not feasible. So, most solutions rely on a s...
An incidental error has occurred in the acknowledgment included in the footnote on the front page of the article (page 241). The correct version is presented below. We sincerely apologize to the authors for this inconvenience. We would like to thank Prof. Miroslaw Kutylowski and anonymous reviewers for their helpful suggestions to improve this paper. We also thank Ph. D Xiangfa Guo for his many...
In an intrusion-resilient cryptosystem [10], two entities (a user and a base) jointly evolve a secret decryption key; this provides very strong protection against an active attacker who can break into the user and base repeatedly and even simultaneously. Recently, a construction of an intrusion-resilient public-key encryption scheme based on specific algebraic assumptions has been shown [6]. We...
A certificate issued by a user u for another user v enables any user that knows the public key of u to obtain the public key of v. A certificate dispersal D assigns a set of certificates D.u to each user u in the system so that user u can find a public key of any other user v without consulting a third party. In this paper, we present a stabilizing certificate dispersal protocol that tolerates ...
We discuss here some of the issues that must be considered to build evidence in an appropriate way in a public-key infrastructure (PKI). Despite the fact that one of the most recurrent motivation by papers advocating the necessity of a PKI, is to support electronic commerce , all the new proposals of PKIs do not deene any procedure to specify which evidence must be collected and in which form, ...
Cryptographic accumulators are a tool for compact set representation and secure set membership proofs. When an element is added to a set by means of an accumulator, a membership witness is generated. This witness can later be used to prove the membership of the element. Typically, the membership witness has to be synchronized with the accumulator value: it has to be updated every time another e...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید