site stats

Signing key exposure resistance

WebSep 10, 2024 · Furthermore, we demonstrate that Hung et al.’s RIBS scheme is vulnerable to signing key exposure attack. To solve these problems, we construct an improved RIBS scheme with strong unforgeability and signing key exposure resistance in the standard model. Compared with previous RIBS schemes without random oracles, ... WebTY - JOUR A2 - Kapron, Bruce M. AU - Xie, Congge AU - Weng, Jian AU - Wen, Jinming PY - 2024 DA - 2024/01/14 TI - Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices SP - 1743421 VL - 2024 AB - In 2014, a new security definition of a revocable identity-based signature (RIBS) with signing key exposure …

Revocable Threshold Attribute-Based Signature against Signing Key Exposure

WebIn this paper, we aim to provide a scalable revocation mechanism for attribute-based signature (ABS). Specifically, we first formally define the syntax of revocable ABS (RABS), … WebApr 17, 2024 · Then, we propose a scalable RIBS scheme with signing key exposure resistance by combining the complete subtree method with Galindo and Garcia’s IBS … do they put plastic in cheese https://rixtravel.com

Revocable attribute-based encryption with decryption key …

WebPrevious work on Key Exposure Freeness. The problem of key exposure was partly addressed in [1], where it is shown how to build identity-based chameleon hash functions. The advantage of using the identity-based primitives is that applications could direct the use of transaction-specific chameleon hashes: The public key associated to a ... Weber a signing key exposure attack and cannot withstand this attack. Furthermore, we propose an improved RIBS scheme that provides strong unforgeability and signing key exposure resistance in the standard mod-el. In addition, the analysis results indicate that our scheme has higher computational performance and security. 2. Preliminaries WebMay 1, 2015 · If a signature scheme can resist the signing key exposure attack, then the users store their secret keys on physical devices with relatively high security levels, while … do they put red dye in beef

Revocable identity-based fully homomorphic signature scheme …

Category:Revocable Identity-based Fully Homomorphic Signature Scheme …

Tags:Signing key exposure resistance

Signing key exposure resistance

Revocable Threshold Attribute-Based Signature against Signing Key Exposure

WebMay 1, 2024 · In addition, we introduce a new security definition of RIBFHS with signing key exposure resistance. Then, we employ Agrawal’s left–right lattices and delegation … WebFeb 5, 2015 · Cloud storage auditing is viewed as an important service to verify the integrity of the data in public cloud. Current auditing protocols are all based on the assumption that the client's secret key for auditing is absolutely secure. However, such assumption may not always be held, due to the possibly weak sense of security and/or low security settings at …

Signing key exposure resistance

Did you know?

WebJan 14, 2024 · In 2014, a new security definition of a revocable identity-based signature (RIBS) with signing key exposure resistance was introduced. Based on this new … WebMar 26, 2024 · Abstract. Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into …

WebIn addition, we introduce a new security definition of RIBFHS with signing key exposure resistance. Then, we employ Agrawal's left–right lattices and delegation technology in …

WebIn 2014, a new security definition of a revocable identity-based signature (RIBS) with signing key exposure resistance was introduced. Based on this new... DOAJ is a community … WebFeb 1, 2024 · Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance @article{Xie2024RevocableIF, title={Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance}, author={Congge Xie and Jian Weng and Dehua Zhou}, journal={Inf. Sci.}, year={2024}, volume={594}, …

WebFeb 11, 2016 · Abstract: Key-exposure resistance has always been an important issue for in-depth cyber defence in many security applications. Recently, how to deal with the key exposure problem in the settings of cloud storage auditing has been proposed and studied. To address the challenge, existing solutions all require the client to update his secret keys …

WebMar 26, 2024 · Abstract. Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy ... city of west hartford ctWeb13 hours ago · In fact, copper mining deals exceeded gold mining deals in total value last year, according to a new report by S&P Global. M&A work among copper companies in 2024 totaled more than $14 billion in ... city of west haven building deptWebMar 31, 2024 · Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance. Inf. Sci. 594: 249-263 (2024) 2024 [j5] view. electronic edition via DOI; ... Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices. Secur. Commun. Networks 2024: 1743421:1-1743421:11 (2024 ... do they put glue in meatWebSep 15, 2024 · Public key cryptography is a major branch of modern cryptography and forms the foundation of computer and network security, as well as electronic commerce. It is a fantastic and fast evolving research area. New public key cryptographic technologies and systems, such as identity-based, attributed-based and functional cryptosystems, have … do they put fluoride in tap water ukWebsize, and the revocation mechanism with public channels. However, the KGC’s overhead increases linearly with the number of users, which results in issues with scalability. Moreo city of west haven board of educationWebMay 1, 2024 · Definition 4 Forward Security(Key-Exposure Resilience) under Continual Leakage. An auditing protocol is l-Forward Secure(Key-Exposure Resilient) under Continual Leakage if for any probabilistic polynomial-time adversary A, the advantage of the adversary to win the above game is a negligible function in λ. 4.2. Our protocol do they put litter boxes in schoolsWebWe reviewed existing lattice-based RIBS schemes and found that all these schemes are vulnerable to signing key exposure. Hence, in this paper, we propose the first lattice … city of west haven bulk pick up schedule