The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Proxy authorization signature is essential to electronic commerce and other electronic transaction. This paper analyzed the security threats of present proxy authorization signatures and the basic principles of proxy signature together with its superiority in electronic transaction application. We present a conditionally anonymous proxy authorization signature scheme with forward security. The identity...
In 2005, Wang et al. proposed a forward secure proxy signature scheme, they claimed that an adversary could not forge the former proxy signature even if proxy signerpsilas current secret key is lost. However, Zhang et al. pointed out that their scheme is insecure and doesnpsilat satisfy the forward security. Furthermore, Zhang et al. presented a modification scheme. Unfortunately, we find that their...
In this paper, we propose two server-assisted forward secure signature schemes using Bellare-Miner Scheme. In the first scheme, the user (signer) can employ a server to help her to produce a signature. In the second scheme, the number of employed servers is increased to n, therefore, it is infeasible for an attacker to forge a valid signature if she canpsilat corrupt all servers and the signer. The...
Authenticated encryption scheme is very useful for transmitting a confidential message in insecure networks. Recently, Li et al. give a new forward-security authenticated encryption scheme, and Hung-Yu Chien also give a convertible authenticated encryption scheme. However, our analysis shows that the two schemes are extremely insecure. The common flaw of the two schemes is forgeability and repudiation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.