2011
DOI: 10.1007/s12204-011-1207-3
|View full text |Cite
|
Sign up to set email alerts
|

An efficient threshold key-insulated signature scheme

Abstract: To tackle the key-exposure problem in signature settings, this paper introduces a new cryptographic primitive named threshold key-insulated signature (TKIS) and proposes a concrete TKIS scheme For a TKIS system, at least k out of n helpers are needed to update a user's temporary private key. On the one hand, even if up to k−1 helpers are compromised in addition to the exposure of any of temporary private keys, security of the non-exposed periods is still assured. On the other hand, even if all the n helpers ar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Composite material fatigue threshold concept is shown in Fig. 2, this figure shows the properties of the composite material, the fatigue threshold is quite high [6][7][8]. In order to use the ultimate strength method requires maximum design spectrum loading stress σ MSL not be greater than B basis fatigue threshold, therefore: σ MSL <σ thB.…”
Section: Fatigue Test Methodsmentioning
confidence: 99%
“…Composite material fatigue threshold concept is shown in Fig. 2, this figure shows the properties of the composite material, the fatigue threshold is quite high [6][7][8]. In order to use the ultimate strength method requires maximum design spectrum loading stress σ MSL not be greater than B basis fatigue threshold, therefore: σ MSL <σ thB.…”
Section: Fatigue Test Methodsmentioning
confidence: 99%
“…DS faces difficulties with securing the private keys, verification and secrecy. In terms of securing the private keys, if they are exposed, all security promises are gone [5]. Therefore, most of developers and cryptosystem designers believe that we should keep the private keys in a safe way (like never send or store the private keys in plain text).…”
Section: Related Workmentioning
confidence: 99%
“…In order to study the mercury removal efficiency of the dust layer on the surface of the filter bag caused by modified fly ash, we separately chose the modified and unmodified fly ash as the dust load on the filter. Due to the best 42% mercury removal efficiency of the HBT filter [11], this experiment chose it as the filter load.…”
mentioning
confidence: 99%