The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A short key-insulated aggregate signature scheme with specified verifier is proposed in this paper. Our scheme is obtained from a modification of Dodis' strong key-insulated signature scheme. The characteristics of the scheme are as follows: (1). Satisfy strong key-insulated security that minimizes the damage caused by key-exposure; (2). Have properties of short signature; (3). Only the specified...
In 2009, J. Li and P. Jiang proposed a provably secure identity-based signature scheme using bilinear pairings, which is claimed secure in the standard model. However, we present that any attacker can forge the private key of an identity or a signature if the second part of an identity's private key is not certificated by the Private Key Generator (PKG). Therefore, the signature-based binding of the...
D. Catalano, R. Gennaro and S. Halevi had proposed a modular inversion protocol for computing a shared RSA private exponent. In this paper, we propose the security analysis of this shared modular inversion protocol. Firstly, we prove that Catalano-Gennaro-Halevi protocol is insecure when the public exponent is larger than a specific integer. Secondly, it is shown that a fraction of the private exponent...
Huang and Chang proposed a flexible forward-secure signature scheme in International Journal of Computer Science and Network Security in 2006. In this paper, we give the security analysis of this scheme and point out this scheme doesn't satisfy the forward security. The main reason is that some secret parameters are used and these secret parameters should be viewed as a part of secret key. If an adversary...
Recently, H. Jiang proposed a (t, n) threshold proxy sig nature scheme based on RSA cryptosystem, in which any t or more proxy signers can cooperatively generate a proxy signature while t-1 or less of them can't do it. In this paper, we propose a security analysis of H. Jiang's threshold proxy signature scheme and show that when e>p+q, the original signer can compute the group proxy private key...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.