Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/1464
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSunitha, N.R-
dc.contributor.authorAmberker, B.B-
dc.date.accessioned2024-11-12T10:40:41Z-
dc.date.available2024-11-12T10:40:41Z-
dc.date.issued2008-
dc.identifier.citation10.1109/TENCON.2008.4766832en_US
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/1464-
dc.descriptionNITWen_US
dc.description.abstractOrdinary digital signatures have an inherent weakness: if the secret key is leaked, then all signatures, even the ones generated before the leak, are no longer trustworthy. Forward-secure digital signatures address this weakness, they ensure that the past signatures remain secure even if the current secret key is leaked. Following the notion of aggregate signatures introduced by Boneh et al, which provides compression of signatures, we have come up with aggregate signature schemes for ElGamal/DSA/Bellare-Miner forward-secure signatures. We describe two schemes of aggregation for the Bellare-Miner Scheme. The first is a aggregate signature scheme with aggregation done separately in different time periods.The second is a aggregate signature scheme with aggregation done for a set of time periods.en_US
dc.language.isoenen_US
dc.publisherIEEE Region 10 Annual International Conference, Proceedings/TENCONen_US
dc.subjectAggregate Signatureen_US
dc.subjectForwardSecurityen_US
dc.subjectKey evolutionen_US
dc.subjectHash functionen_US
dc.subjectDigital Signatureen_US
dc.titleSome Aggregate Forward-Secure Signature Schemesen_US
dc.typeOtheren_US
Appears in Collections:Computer Science & Engineering

Files in This Item:
File Description SizeFormat 
Some_aggregate_forward-secure_signature_schemes.pdf171.08 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.