Sciweavers

66 search results - page 5 / 14
» Proactive Public Key and Signature Systems
Sort
View
ISW
2004
Springer
15 years 5 months ago
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model
In key-insulated cryptography, there are many private keys with different indexes and a single, fixed public key. When the trust model includes multiple Certification Authoritie...
Zhengyi Le, Yi Ouyang, James Ford, Fillia Makedon
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
15 years 4 months ago
On Signatures of Knowledge
In a traditional signature scheme, a signature on a message m is issued under a public key PK, and can be interpreted as follows: "The owner of the public key PK and its corr...
Melissa Chase, Anna Lysyanskaya
91
Voted
JNW
2008
103views more  JNW 2008»
15 years 9 days ago
Key Revocation System for DNSSEC
Abstract-- The Domain Name System (DNS) is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions...
Gilles Guette
IJNSEC
2008
91views more  IJNSEC 2008»
15 years 10 days ago
A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes
Tseng et al. have introduced in 2003 an authenticated encryption scheme by using self-certified public keys. Based on this scheme several authors have proposed new signature schem...
Luis Hernández Encinas, Ángel Mart&i...
IJNSEC
2007
164views more  IJNSEC 2007»
15 years 7 days ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...