Sequential digital signatures for cryptographic software-update authentication
From MaRDI portal
Publication:6109437
DOI10.1007/978-3-031-17146-8_13zbMath1524.68045OpenAlexW4296959840MaRDI QIDQ6109437
Simon Rastikian, Bertram Poettering
Publication date: 28 July 2023
Published in: Computer Security – ESORICS 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-17146-8_13
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Computer security (68M25)
Cites Work
- Generic double-authentication preventing signatures and a post-quantum instantiation
- Shorter double-authentication preventing signatures for small address spaces
- Subverting decryption in AEAD
- Security of Symmetric Encryption against Mass Surveillance
- A More Cautious Approach to Security Against Mass Surveillance
- Hash-based Digital Signature Schemes
- Double-Authentication-Preventing Signatures
- Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures
- Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation
- Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes
This page was built for publication: Sequential digital signatures for cryptographic software-update authentication