Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/1464| Title: | Some Aggregate Forward-Secure Signature Schemes |
| Authors: | Sunitha, N.R Amberker, B.B |
| Keywords: | Aggregate Signature ForwardSecurity Key evolution Hash function Digital Signature |
| Issue Date: | 2008 |
| Publisher: | IEEE Region 10 Annual International Conference, Proceedings/TENCON |
| Citation: | 10.1109/TENCON.2008.4766832 |
| Abstract: | Ordinary digital signatures have an inherent weakness: if the secret key is leaked, then all signatures, even the ones generated before the leak, are no longer trustworthy. Forward-secure digital signatures address this weakness, they ensure that the past signatures remain secure even if the current secret key is leaked. Following the notion of aggregate signatures introduced by Boneh et al, which provides compression of signatures, we have come up with aggregate signature schemes for ElGamal/DSA/Bellare-Miner forward-secure signatures. We describe two schemes of aggregation for the Bellare-Miner Scheme. The first is a aggregate signature scheme with aggregation done separately in different time periods.The second is a aggregate signature scheme with aggregation done for a set of time periods. |
| Description: | NITW |
| URI: | http://localhost:8080/xmlui/handle/123456789/1464 |
| Appears in Collections: | Computer Science & Engineering |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Some_aggregate_forward-secure_signature_schemes.pdf | 171.08 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.