Signing key exposure resistance

WebDec 19, 2024 · The key exposure is a serious threat for the security of data integrity auditing. Once the user's private key for auditing is exposed, most of the existing data integrity auditing schemes would inevitably become unable to work. To deal with this problem, we construct a novel and efficient identity-based data integrity auditing scheme with key … WebPrevious work on Key Exposure Freeness. The problem of key exposure was partly addressed in [1], where it is shown how to build identity-based chameleon hash functions. The advantage of using the identity-based primitives is that applications could direct the use of transaction-specific chameleon hashes: The public key associated to a ...

On the Incoercibility of Digital Signatures

WebMar 31, 2024 · Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance. Inf. Sci. 594: 249-263 (2024) 2024 [j5] view. electronic edition via DOI; ... Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices. Secur. Commun. Networks 2024: 1743421:1-1743421:11 (2024 ... WebFeb 1, 2024 · Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance @article{Xie2024RevocableIF, title={Revocable identity-based … rbc increase food https://nakytech.com

Cryptography Special Issue : Public Key Cryptography - MDPI

WebJan 14, 2024 · In 2014, a new security definition of a revocable identity-based signature (RIBS) with signing key exposure resistance was introduced. Based on this new … WebMay 1, 2015 · If a signature scheme can resist the signing key exposure attack, then the users store their secret keys on physical devices with relatively high security levels, while … WebApr 1, 2024 · In [15], the key exposure is against the partial decryption key (or transformation key) possessed by the CSP while in this paper we consider the exposure … sims 3 skin replacement mod

Revocable Threshold Attribute-Based Signature against Signing Key Exposure

Category:Revocable identity-based fully homomorphic signature scheme …

Tags:Signing key exposure resistance

Signing key exposure resistance

Revocable Threshold Attribute-Based Signature against Signing Key Exposure

WebSep 10, 2024 · Furthermore, we demonstrate that Hung et al.’s RIBS scheme is vulnerable to signing key exposure attack. To solve these problems, we construct an improved RIBS scheme with strong unforgeability and signing key exposure resistance in the standard model. Compared with previous RIBS schemes without random oracles, ... WebDec 19, 2024 · The key exposure is a serious threat for the security of data integrity auditing. Once the user's private key for auditing is exposed, most of the existing data integrity …

Signing key exposure resistance

Did you know?

Weber a signing key exposure attack and cannot withstand this attack. Furthermore, we propose an improved RIBS scheme that provides strong unforgeability and signing key exposure resistance in the standard mod-el. In addition, the analysis results indicate that our scheme has higher computational performance and security. 2. Preliminaries WebMay 1, 2024 · Definition 4 Forward Security(Key-Exposure Resilience) under Continual Leakage. An auditing protocol is l-Forward Secure(Key-Exposure Resilient) under Continual Leakage if for any probabilistic polynomial-time adversary A, the advantage of the adversary to win the above game is a negligible function in λ. 4.2. Our protocol

WebIn addition, we introduce a new security definition of RIBFHS with signing key exposure resistance. Then, we employ Agrawal's left–right lattices and delegation technology in … WebMar 26, 2024 · Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature unde

WebMay 1, 2024 · In addition, we introduce a new security definition of RIBFHS with signing key exposure resistance. Then, we employ Agrawal’s left–right lattices and delegation … WebFeb 1, 2024 · Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance @article{Xie2024RevocableIF, title={Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance}, author={Congge Xie and Jian Weng and Dehua Zhou}, journal={Inf. Sci.}, year={2024}, volume={594}, …

WebMay 1, 2024 · In this study, we propose a concrete leveled RIBFHS with signing key exposure resistance. The main contributions of this study are summarized as follows: 1. …

WebMay 1, 2015 · If a signature scheme can resist the signing key exposure attack, then the users store their secret keys on physical devices with relatively high security levels, while the update keys can be ... sims 3 skin replacementWebFeb 1, 2024 · In addition, we extend our interest into identity-based signatures; we introduce a new security definition of revocable identity-based signature (RIBS) with signing key … rbc index funds couch potatoWebIn this paper, we aim to provide a scalable revocation mechanism for attribute-based signature (ABS). Specifically, we first formally define the syntax of revocable ABS (RABS), followed with a corresponding security model that considers a realistic threat called signing key exposure. Then, built on the ideas of an ABS scheme and binary data ... sims 3 skyscraper downloadsWebMar 26, 2024 · Abstract. Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into … rbc increase paymentWebTY - JOUR A2 - Kapron, Bruce M. AU - Xie, Congge AU - Weng, Jian AU - Wen, Jinming PY - 2024 DA - 2024/01/14 TI - Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices SP - 1743421 VL - 2024 AB - In 2014, a new security definition of a revocable identity-based signature (RIBS) with signing key exposure … rbc in csf causesWebMay 1, 2024 · In addition, we introduce a new security definition of RIBFHS with signing key exposure resistance. Then, we employ Agrawal’s left–right lattices and delegation … sims 3 singing careerWebFeb 5, 2015 · Cloud storage auditing is viewed as an important service to verify the integrity of the data in public cloud. Current auditing protocols are all based on the assumption that the client's secret key for auditing is absolutely secure. However, such assumption may not always be held, due to the possibly weak sense of security and/or low security settings at … sims 3 skill cheats