Signing key exposure resistance

WebSep 10, 2024 · Furthermore, we demonstrate that Hung et al.’s RIBS scheme is vulnerable to signing key exposure attack. To solve these problems, we construct an improved RIBS scheme with strong unforgeability and signing key exposure resistance in the standard model. Compared with previous RIBS schemes without random oracles, ... WebFeb 1, 2024 · Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance @article{Xie2024RevocableIF, title={Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance}, author={Congge Xie and Jian Weng and Dehua Zhou}, journal={Inf. Sci.}, year={2024}, volume={594}, …

Efficient and Fine-Grained Signature for IIoT With Resistance to Key Exposure IEEE Journals & Magazine IEEE Xplore

WebPrevious work on Key Exposure Freeness. The problem of key exposure was partly addressed in [1], where it is shown how to build identity-based chameleon hash functions. The advantage of using the identity-based primitives is that applications could direct the use of transaction-specific chameleon hashes: The public key associated to a ... WebFeb 1, 2024 · In addition, we extend our interest into identity-based signatures; we introduce a new security definition of revocable identity-based signature (RIBS) with signing key … florida cyber charter academy jacksonville fl https://eastwin.org

Enabling Cloud Storage Auditing With Key-Exposure Resistance

WebApr 17, 2024 · Then, we propose a scalable RIBS scheme with signing key exposure resistance by combining the complete subtree method with Galindo and Garcia’s IBS … Webdigital signatures can be combined with passwords [1, 2], smart cards [3], biometrics [4], cha-otic parallel keyed hash functions [5] and other technologies to achieve identity au WebIn 2014, a new security definition of a revocable identity-based signature (RIBS) with signing key exposure resistance was introduced. Based on this new... DOAJ is a community … florida drivers license online

Revocable Identity-based Fully Homomorphic Signature Scheme …

Category:Revocable identity-based proxy re-signature against signing key exposure.

Tags:Signing key exposure resistance

Signing key exposure resistance

ResearchGate

WebNov 2, 2024 · The Key Exposure Resistant GKA Protocol. In the key exposure resistant GKA protocol, the secret sharing scheme is employed to resist the rushing attack with the key … WebMay 1, 2024 · In this study, we propose a concrete leveled RIBFHS with signing key exposure resistance. The main contributions of this study are summarized as follows: 1. …

Signing key exposure resistance

Did you know?

WebIn addition, we introduce a new security definition of RIBFHS with signing key exposure resistance. Then, we employ Agrawal's left–right lattices and delegation technology in … WebIn this paper, we aim to provide a scalable revocation mechanism for attribute-based signature (ABS). Specifically, we first formally define the syntax of revocable ABS (RABS), …

WebMay 1, 2024 · In addition, we introduce a new security definition of RIBFHS with signing key exposure resistance. Then, we employ Agrawal’s left–right lattices and delegation … WebMar 26, 2024 · Lian et al. proposed a revocable attribute-based signature scheme, but Wei et al. revealed that Lian et al.’s scheme is vulnerable to signing key exposure. If a signature …

WebIn 2014, a new security definition of a revocable identity-based signature (RIBS) with signing key exposure resistance was introduced. Based on this new definition, many scalable … WebFeb 11, 2016 · Abstract: Key-exposure resistance has always been an important issue for in-depth cyber defence in many security applications. Recently, how to deal with the key exposure problem in the settings of cloud storage auditing has been proposed and studied. To address the challenge, existing solutions all require the client to update his secret keys …

WebMay 1, 2024 · Definition 4 Forward Security(Key-Exposure Resilience) under Continual Leakage. An auditing protocol is l-Forward Secure(Key-Exposure Resilient) under Continual Leakage if for any probabilistic polynomial-time adversary A, the advantage of the adversary to win the above game is a negligible function in λ. 4.2. Our protocol

WebDec 19, 2024 · The key exposure is a serious threat for the security of data integrity auditing. Once the user's private key for auditing is exposed, most of the existing data integrity auditing schemes would inevitably become unable to work. To deal with this problem, we construct a novel and efficient identity-based data integrity auditing scheme with key … florida department of health beachesWebalso note that key exposure against the transformation key is unnecessary when the key updated is sent through via a public channel since the transformation key can be derived by anyone. On the other hand, since the user decryption. 95 key is static, it obviously cannot resist the decryption key exposure attack we. 5 florida gopher tortoise management planWebJan 14, 2024 · In 2014, a new security definition of a revocable identity-based signature (RIBS) with signing key exposure resistance was introduced. Based on this new … florida georgia line holy holyWebFeb 5, 2015 · Cloud storage auditing is viewed as an important service to verify the integrity of the data in public cloud. Current auditing protocols are all based on the assumption that the client's secret key for auditing is absolutely secure. However, such assumption may not always be held, due to the possibly weak sense of security and/or low security settings at … florida food pantry rulesWebMar 26, 2024 · Abstract. Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy ... florida department of health help deskWebApr 1, 2024 · In [15], the key exposure is against the partial decryption key (or transformation key) possessed by the CSP while in this paper we consider the exposure … florida gator stickers for a carWebTY - JOUR A2 - Kapron, Bruce M. AU - Xie, Congge AU - Weng, Jian AU - Wen, Jinming PY - 2024 DA - 2024/01/14 TI - Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices SP - 1743421 VL - 2024 AB - In 2014, a new security definition of a revocable identity-based signature (RIBS) with signing key exposure … florida department of health staff directory