Journal of Applied Sciences1812-56541812-5662Asian Network for Scientific Information10.3923/jas.2008.1967.1971MaChunbo AoJun 102008810The encryption scheme based on Forward Key Rotation is such a scheme that only the authorized person is allowed access to the designated files and the previous versions. In this study, we present a Forward Key Rotation storage scheme based on discrete logarithm and prove its security under random oracle model. Moreover, we propose another improved Forward Key storage scheme from pairing on elliptic curves. Compared to the scheme presented by Kallahalla et al. our scheme uses relatively short keys to provide equivalent security. In addition, the re-generated keys can be verified to ensure that the keys are valid in the improved scheme.]]>Blaze, M.,19931993pp: 916Boneh, D., B. Lynn and H. Shacham,2001pp: 514-532pp: 514-532Boneh, D. and M. Franklin,200332586615Freeman, W. and E. Miller,20002000pp: 361373Ganger, G.R., P.K. Khosla, M. Bakkaloglu, M.W. Bigrigg and G.R. Goodson et al.,20012184195Gobioff, H., G. Gibson and D. Tygar,19971997Gobioff, H., D. Nagle and G. Gibson,19991999Kallahalla, M., E. Riedel, R. Swaminathan, Q. Wang and K. Fu,20032003pp: 2942Miller, E.L., D.D.E. Long, W. Freeman and B. Reed,20012001pp: 3440Paulo, S.L., M. Barreto, H.Y. Kim, B. Lynn and M. Scott,2002pp: 354-368pp: 354-368Rivest, R.L., A. Shamir and L. Adleman,197821120126Wylie, J.J., M.W. Bigrigg, J.D. Strunk, G.R. Ganger, H. Kiliccote and P.K. Khosla,2000336168Zhang, F., R. Safavi-Naini and W. Susilo,2004pp: 277-290pp: 277-290