Thesis Proposal: Spontaneous Anonymous Group Cryptography and its Applications
نویسندگان
چکیده
Spontaneous Anonymous Group (SAG) Cryptography studies cryptographic problems in which an entity specifies a group of entites including itself arbitrarily and spontaneously while maintaining its anonymity. There is no Trusted Third Party (TTP) or group manager to get involved. Also, no membership collaboration or any preprocessing is needed.These properties are desirable for many applications requiring privacy protections, e.g. e-cash, anonymous authentication and e-voting.
منابع مشابه
Pairings in Trusted Computing
Pairings have now been used for constructive applications in cryptography for around eight years. In that time the range of applications has grown from a relatively narrow one of identity based encryption and signatures, through to more advanced protocols. In addition implementors have realised that pairing protocols once presented can often be greatly simplified or expanded using the mathemati...
متن کاملInvestigating Methods of Kleptography
Due to the fast development in information and communication technology, new challenging problems appear in the security. So, it is important and vital that the scientific society of our country focuses on research and studies these problems and by providing new proposal try to respond to these critical needs of our country. Hence, our aim in this paper is to study and highlight one of the impo...
متن کاملP-160: Study of Association between Polymorphism in Estrogen Response Element (ERE) in Promoter Region of C3 Gene and Spontaneous Recurrent Abortion
Background: There are different etiological factors in spontaneous recurrent abortion which are one of the complications in pregnancy. Primary embryo development in uterine tube and oviduct are affected by different factors such as embryotrophic elements. ETF3 as a embryotrophic factor that contains a complex of complement 3 protein and its derivatives specially iC3b, causes embryo trophoblast ...
متن کاملمطالعهای بر رمزنگاری بصری و ارائهی روش پیشنهادی برای رمزنگاری تصاویر رنگی
Visual cryptography is a method that makes use of the characteristics of human vision and it requires neither the knowledge of cryptography nor the complex calculations. This method was first proposed by Naor and Shamir, its implementation is simple, it has been extended to an secrect sharing (k, n) in which n shares are made from the image and they are distributed among n participants. Moreov...
متن کاملبررسی نظرات دانشجویان پزشکی زاهدان در مورد تاثیر درس بهداشت4 و اتاق مشاوره بر پایاننامه آنان
Objectives : The course "Health IV" and "consulting room" are two resources of learning about the method of preparing proposal and passing the final thesis for medical students at Zahedan University of Medical Sciences (ZUMS). The purpose of this study was to investigate the students' viewpoints on the effects of "Health IV" and consulting room on their final theses (pl. of thesis). Methods : T...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003