Sciweavers

111 search results - page 3 / 23
» Signature Schemes Secure Against Hard-to-Invert Leakage
Sort
View
ISPEC
2005
Springer
14 years 3 months ago
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes
A (t, n) threshold proxy signature scheme enables an original signer to delegate the signature authority to a proxy group of n member such that t or more than t proxy signers can ...
Zuowen Tan, Zhuojun Liu, Wang Mingsheng
ISW
2004
Springer
14 years 3 months ago
How to Break and Repair a Universally Composable Signature Functionality
Abstract. Canetti and Rabin recently proposed a universally composable ideal functionality FSIG for digital signatures. We show that this functionality cannot be securely realized ...
Michael Backes, Dennis Hofheinz
EUROCRYPT
2007
Springer
14 years 3 months ago
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
Abstract. Multiparty signature protocols need protection against roguekey attacks, made possible whenever an adversary can choose its public key(s) arbitrarily. For many schemes, p...
Thomas Ristenpart, Scott Yilek
CRYPTO
2010
Springer
201views Cryptology» more  CRYPTO 2010»
13 years 10 months ago
Protecting Cryptographic Keys against Continual Leakage
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys a...
Ali Juma, Yevgeniy Vahlis
GLOBECOM
2008
IEEE
14 years 4 months ago
Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs
—The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key m...
Yong Hao, Yu Cheng, Kui Ren