Enabling cloud storage auditing with key-exposure resistance
Cloud storage auditing is viewed as an important service to verify the integrity of the data in
public cloud. Current auditing protocols are all based on the assumption that the client's …
public cloud. Current auditing protocols are all based on the assumption that the client's …
Forward-secure signatures with optimal signing and verifying
We propose the first forward-secure signature scheme for which both signing and verifying
are as efficient as for one of the most efficient ordinary signature schemes (Guillou …
are as efficient as for one of the most efficient ordinary signature schemes (Guillou …
Strong key-insulated signature schemes
Signature computation is frequently performed on insecure devices—eg, mobile phones—
operating in an environment where the private (signing) k ey is likely to be exposed. Strong …
operating in an environment where the private (signing) k ey is likely to be exposed. Strong …
Removing escrow from identity-based encryption: New security notions and key management techniques
SSM Chow - International workshop on public key cryptography, 2009 - Springer
Key escrow is inherent in identity-based encryption (IBE). A curious key generation center
(KGC) can simply generate the user's private key to decrypt a ciphertext. However, can a …
(KGC) can simply generate the user's private key to decrypt a ciphertext. However, can a …
Intrusion-resilience via the bounded-storage model
S Dziembowski - Theory of Cryptography Conference, 2006 - Springer
We introduce a new method of achieving intrusion-resilience in the cryptographic protocols.
More precisely we show how to preserve security of such protocols, even if a malicious …
More precisely we show how to preserve security of such protocols, even if a malicious …
A survey of leakage-resilient cryptography
In the past 15 years, cryptography has made considerable progress in expanding the
adversarial attack model to cover side-channel attacks and has built schemes to provably …
adversarial attack model to cover side-channel attacks and has built schemes to provably …
Certificateless Key‐Insulated Generalized Signcryption Scheme without Bilinear Pairings
C Zhou, Z Zhao, W Zhou, Y Mei - Security and Communication …, 2017 - Wiley Online Library
Generalized signcryption (GSC) can be applied as an encryption scheme, a signature
scheme, or a signcryption scheme with only one algorithm and one key pair. A key‐insulated …
scheme, or a signcryption scheme with only one algorithm and one key pair. A key‐insulated …
The cybersecurity dynamics way of thinking and landscape
S Xu - Proceedings of the 7th ACM Workshop on Moving …, 2020 - dl.acm.org
The Cybersecurity Dynamics framework offers an approach to systematically understanding,
characterizing, quantifying and managing cybersecurity from a holistic perspective. The …
characterizing, quantifying and managing cybersecurity from a holistic perspective. The …
Communication-optimal proactive secret sharing for dynamic groups
J Baron, KE Defrawy, J Lampkins… - International conference on …, 2015 - Springer
Proactive secret sharing (PSS) schemes are designed for settings where long-term
confidentiality of secrets is required, specifically, when all participating parties may …
confidentiality of secrets is required, specifically, when all participating parties may …
Forward-secure signatures with untrusted update
In most forward-secure signature constructions, a program that updates a user's private
signing key must have full access to the private key. Unfortunately, these schemes are …
signing key must have full access to the private key. Unfortunately, these schemes are …