A Review on Multi Level Identity Based Cryptography for Secure Digital Signature Authentication
نویسندگان
چکیده
Digital Signature authentication is widely used mechanism to transfer sensitive information over networks securely. Digital signature is an electronic signature used for authentication of identity of parties in applications like E-commerce which are frequently involved in monetary transactions. Identity based cryptography can secure digital signature authentication besides ensuring integrity, confidentiality and non-repudiation. It also facilitates to use a publicly known string that represents a party as public key. In fact it is an emerging technique which works in tandem with public key cryptography. It is more useful when compared to classical public key infrastructure. Identity based cryptography also makes key distribution process very simple. Multilevel identity based cryptography can add more layers of security for digital signature authentication. Know how about the features of this modern security mechanism can help secure real world sensitive communications over Internet. In this paper we investigate, and analyze the present state-of-the-art of this emerging approach to public key cryptography. We also evaluate the approaches pertaining to identity based cryptography in terms of robustness, utility and performance.
منابع مشابه
An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملSecure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues
The term “proxy multi-signature” refers to the situation in which a proxy signer is authorized to sign a message on behalf of a group of original signers. Combined with identity-based cryptography, we proposed an efficient identity-based proxy multi-signature scheme using cubic residues without bilinear pairing. Our scheme is secure against existential forgery on adaptive chosenmessage and iden...
متن کاملIdentity Authentication and Key Agreement Schemes for Ad Hoc Networks
Identity authentication and key agreement schemes play significant role in ad hoc networks. In this paper, a new identity authentication scheme relies on the threshold group signature is introduced. Compared with the current schemes it is secure, efficient and adaptable to a multi-hop feature of ad hoc networks. In addition, a new key agreement scheme based on the threshold cryptography using t...
متن کاملAn Efficient and Secure Digital Multi- Signature Protocol Based on Ecc
Digital Signatures play a crucial role today as it ensures authentication, integrity and non-repudiation of a digital message. Many researches are ongoing based on elliptic curve cryptography due to its significant high performance. In this paper we propose an efficient and secure digital multi-signature protocol based on elliptic curve cryptography. The proposed protocol is efficient with redu...
متن کاملImplementation of Anonymous and Secure Communication System With Group Signatures: A Review
-For Privacy Preserving Communications Both Anonymity and end to end encryption mechanism is essential. Identity Based Encryption technique is best suitable for secure and anonymous communications. For solving anonymous and secure communication problems both cryptographic and IBE based protocols needed which governs the proper communication between two parties. For the purpose of authentication...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014