Efficient Intrusion-Resilient Signatures Without Random Oracles

Efficient Intrusion-Resilient Signatures Without Random Oracles,10.1007/11937807_3,Benoît Libert,Jean-jacques Quisquater,Moti Yung

Efficient Intrusion-Resilient Signatures Without Random Oracles   (Citations: 2)
BibTex | RIS | RefWorks Download
Intrusion-resilient signatures are key-evolving protocols that extend the concepts of forward-secure and key-insulated signatures. As in the latter schemes, time is divided into distinct periods where private keys are periodically updated while public keys remain fixed. Private keys are stored in both a user and a base; signature operations are performed by the user while the base is involved in periodic updates. Such a system remains secure after arbitrarily many compromises of both modules as long as break-ins are not simultaneous. Besides, when they simultane- ously occur within some time period, past periods remain safe. In this work, we propose the first intrusion-resilient signature in the standard model (i.e. without random oracles) which provides both short signatures and at most log-squared private storage in the number of time periods.
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
Sort by: