Secure E-Tendering Using Identity Based Encryption from Bilinear Pairings

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure E-Tendering Using Identity Based Encryption from Bilinear Pairings

An electronic tender system (e-tender) streamlines the tender process and thereby saves time and cost. Security requirements for e-tendering systems have not been closely scrutinized in the literature. In addition to the security concerns of conventional e-tender systems—authentication, integrity, privacy, and non-repudiation are provided. This paper identifies key issues to be addressed in the...

متن کامل

Secure E-Tendering System using Identity Based Signcryption from Bilinear Pairings

An electronic tender system (e-tender) streamlines the tender process and thereby saves time and cost. Security requirements for e-tendering systems have not been closely scrutinized in the literature. In addition to the security concerns of conventional e-tender systems—authentication, integrity, privacy, and non-repudiation are provided. This paper identifies key issues to be addressed in the...

متن کامل

An improved identity-based ring signature scheme from bilinear pairings

Lin-Wu’s ID-based ring signature scheme from bilinear pairings is unreasonable. In this paper, we improve it, and obtain a reasonable ID-based ring signature scheme from bilinear pairings.

متن کامل

Identity-Based Threshold Proxy Signature from Bilinear Pairings

Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate her signing capability to a group of n proxy signers, and it requires a consensus of t or more proxy signers in order to generate a valid signature. In addition to identity-based scheme, privacy protection for proxy singers and s...

متن کامل

Identity-Based Directed Signature Scheme from Bilinear Pairings

In a directed signature scheme, a verifier can exclusively verify the signatures designated to himself, and shares with the signer the ability to prove correctness of the signature to a third party when necessary. Directed signature schemes are suitable for applications such as bill of tax and bill of health. This paper studies directed signatures in the identity-based setting. We first present...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Science and Informatics

سال: 2013

ISSN: 2231-5292

DOI: 10.47893/ijcsi.2013.1094