A new approach to constructing digital signature schemes (extended paper)

A Buldas, D Firsov, R Laanoja, H Lakk… - Cryptology ePrint …, 2019 - eprint.iacr.org
A new hash-based, server-supported digital signature scheme was proposed recently. We
decompose the concept into forward-resistant tags and a generic cryptographic time …

[PDF][PDF] Secure outsourced attribute-based encryption

J Li, J Li, X Chen, C Jia, DS Wong - IACR Cryptology ePrint Archive, 2012, 2012 - Citeseer
Attribute-Based Encryption (ABE) is a promising cryptographic primitive which significantly
enhances the versatility of access control mechanisms. Due to the high expressiveness of …

Practical signing-right revocation

MT Beck, S Krenn, FS Preiss, K Samelin - Trust and Trustworthy …, 2016 - Springer
One of the key features that must be supported by every modern PKI is an efficient way to
determine (at verification) whether the signing key had been revoked. In most solutions, the …

Server-Supported Decryption for Mobile Devices

J Vakarjuk - Security and Trust Management: 18th International …, 2023 - books.google.com
We propose a threshold encryption scheme with two-party decryption, where one of the
keyshares may be stored and used in a device that is able to provide only weak security for …

New access control systems based on outsourced attribute-based encryption1

J Li, X Chen, J Li, C Jia, J Ma… - Journal of Computer …, 2015 - content.iospress.com
As cloud computing becomes prevalent, more and more sensitive data is being centralized
into the cloud for sharing, which brings forth new challenges for outsourced data security …

A new design of privilege management infrastructure with binding signature semantics

K Bicakci, N Baykal - Public Key Infrastructure: First European PKI …, 2004 - Springer
Just like PKI, used to support public key certificates, Privilege Management Infrastructure
(PMI) is built to provide a foundation to employ attribute certificates. Although most of the PKI …

Post Quantum Steganography for Cloud Privacy Preservation using Multivariable Quadratic Polynomial

K Anguraju, RK Prakash, V Sowjanya… - … on Computer, Power …, 2022 - ieeexplore.ieee.org
The cryptography and steganography can be employed as an appropriate tool for improving
the confidentiality of transmissions over the cloud environment. Several of the prevailing …

基于FMTseq 方案的服务器辅助签名

王宝忠, 曹天杰, 黄石 - 微计算机信息, 2008 - cqvip.com
基于FMTseq方案的服务器辅助签名-[维普官方网站]-www.cqvip.com-维普网  我的维普 购物车
充值 客服 首页 | 期刊大全 | 文献分类 | 优先出版 | 论文检测 | 论文选题 | 在线分享 | 会议平台 …

[PDF][PDF] BLT+ L: Efficient Signatures from Timestamping and Endorsements.

D Firsov, H Lakk, S Laur, A Truu - SECRYPT, 2021 - scitepress.org
We propose a new digital signature scheme based on combining cryptographic
timestamping with an endorsement scheme, both of which can be constructed from one-way …

An efficient authentication and simplified certificate status management for personal area networks

C Sur, KH Rhee - Asia-Pacific Network Operations and Management …, 2006 - Springer
Recently the concept of personal PKI was introduced to describe a public key infrastructure
specifically designed to support the distribution of public keys in a personal area network …