نتایج جستجو برای: public key cryptography

تعداد نتایج: 917476  

Journal: :Adv. in Math. of Comm. 2015
Yang Lu Quanling Zhang Jiguo Li

Exposure of secret keys may be the most devastating attack on a public key cryptographic scheme since such that security is entirely lost. The key-insulated security provides a promising approach to deal with this threat since it can effectively mitigate the damage caused by the secret key exposure. To eliminate the cumbersome certificate management in traditional PKIsupported key-insulated sig...

Journal: :IACR Cryptology ePrint Archive 2006
Jun Shao Zhenfu Cao Licheng Wang

The focus of this paper is to design an efficient and secure solution addressing the key escrow problem in ID-based signature schemes, i.e., the Private Key Generator (PKG) knows the user’s private key, which damages the essential requirement–“non-repudiation” property of signature schemes. In this paper, we proposed two ID-based threshold signature schemes, which both reach Girault’s trusted l...

Journal: :DEStech Transactions on Computer Science and Engineering 2017

1995
Charles H. Bennett Gilles Brassard Ueli M. Maurer

This paper provides a general treatment of privacy ampliication by public discussion , a concept introduced by Bennett, Brassard and Robert for a special scenario. Privacy ampliication is a protocol that allows two parties to distill a secret key from a common random variable that is only partially secret, i.e. about which an eavesdropper has some partial information , where the two parties gen...

Journal: :EURASIP J. Wireless Comm. and Networking 2010
Mohamed-Lamine Messai Makhlouf Aliouat Hamida Seba

Securing a wireless communication has generally a vital importance, particularly when this communication is in a hostile environment like in wireless sensor networks (WSNs). The problem is how to create cryptographic keys between sensor nodes to ensure secure communications. Limited resources of sensor nodes make a public key cryptosystem such as RSA not feasible. So, most solutions rely on a s...

Journal: :Fundam. Inform. 2011
Jia Yu Fanyu Kong Xiangguo Cheng Rong Hao Jianxi Fan

An incidental error has occurred in the acknowledgment included in the footnote on the front page of the article (page 241). The correct version is presented below. We sincerely apologize to the authors for this inconvenience. We would like to thank Prof. Miroslaw Kutylowski and anonymous reviewers for their helpful suggestions to improve this paper. We also thank Ph. D Xiangfa Guo for his many...

2004
Yevgeniy Dodis Matthew K. Franklin Jonathan Katz Atsuko Miyaji Moti Yung

In an intrusion-resilient cryptosystem [10], two entities (a user and a base) jointly evolve a secret decryption key; this provides very strong protection against an active attacker who can break into the user and base repeatedly and even simultaneously. Recently, a construction of an intrusion-resilient public-key encryption scheme based on specific algebraic assumptions has been shown [6]. We...

Journal: :JACIC 2005
Mohamed G. Gouda Eunjin Jung

A certificate issued by a user u for another user v enables any user that knows the public key of u to obtain the public key of v. A certificate dispersal D assigns a set of certificates D.u to each user u in the system so that user u can find a public key of any other user v without consulting a third party. In this paper, we present a stabilizing certificate dispersal protocol that tolerates ...

1997
Bruno Crispo

We discuss here some of the issues that must be considered to build evidence in an appropriate way in a public-key infrastructure (PKI). Despite the fact that one of the most recurrent motivation by papers advocating the necessity of a PKI, is to support electronic commerce , all the new proposals of PKIs do not deene any procedure to specify which evidence must be collected and in which form, ...

2015
Leonid Reyzin Sophia Yakoubov

Cryptographic accumulators are a tool for compact set representation and secure set membership proofs. When an element is added to a set by means of an accumulator, a membership witness is generated. This witness can later be used to prove the membership of the element. Typically, the membership witness has to be synchronized with the accumulator value: it has to be updated every time another e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید