Key-Insulated Public Key Cryptosystems
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Strong Key-Insulated Signature Schemes
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
A method for detecting the exposure of OCSP responder's session private key in D-OCSP-KIS
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
A Countermeasure of Fake Root Key Installation Using One-Time Hash Chain
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Security analysis on digital signature function implemented in PDF software
FGIT'11 Proceedings of the Third international conference on Future Generation Information Technology
A method for secure and efficient block cipher using white-box cryptography
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
Hi-index | 0.00 |
Dodis et al proposed a key-insulated signature scheme in 2003. The scheme can minimize the damage caused by the secret key’s exposure but can not protect the user from the secret key’s exposure perfectly. We propose a PKI system which can detect immediately even a single illegitimate signature due to the exposure of a user’s secret key. The system uses the one-time hash chain based on NOVOMODO and can prevent the users from compromising the secret key more perfectly and effectively than the key-insulated signature scheme.