2010
DOI: 10.1587/transfun.e93.a.1039
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Provider Authentication for Bidirectional Broadcasting Service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(14 citation statements)
references
References 8 publications
0
14
0
Order By: Relevance
“…We modified a key-insulated signature (KIS) scheme [9] and applied it to the protocol. In particular, a temporal identity is issued to a service provider that is composed from the time period over which the single signing key is valid and the provider's real identity, and it is used as a time period in a KIS scheme.…”
Section: Our Contributionmentioning
confidence: 99%
See 4 more Smart Citations
“…We modified a key-insulated signature (KIS) scheme [9] and applied it to the protocol. In particular, a temporal identity is issued to a service provider that is composed from the time period over which the single signing key is valid and the provider's real identity, and it is used as a time period in a KIS scheme.…”
Section: Our Contributionmentioning
confidence: 99%
“…DSA, ECDSA, RSA-PSS, and RSASSA signature schemes) is used, there are three variations that are the same as those of Model 1. Although these characteristics are the same as those of Model 1-1, Model 1-2, and Model 1-3, the signature schemes [2]- [4], [6], [7], [9], [11], [12] that have only one verification key for many signing keys can be used in this model. Hence, requirement (1) can be satisfied by using such schemes.…”
Section: (3) Service Providers Must Be Revoked Efficientlymentioning
confidence: 99%
See 3 more Smart Citations