نتایج جستجو برای: identity based cryptography

تعداد نتایج: 3047490  

Journal: :I. J. Network Security 2016
Feng Wang Chin-Chen Chang Changlu Lin Shih-Chang Chang

The term “proxy multi-signature” refers to the situation in which a proxy signer is authorized to sign a message on behalf of a group of original signers. Combined with identity-based cryptography, we proposed an efficient identity-based proxy multi-signature scheme using cubic residues without bilinear pairing. Our scheme is secure against existential forgery on adaptive chosenmessage and iden...

2010
Jerzy PEJAŚ Tomasz KLASA

Verification of claimed identity becomes a problem of growing significance nowadays, as the number of e-commerce transactions grows rapidly and new information distribution channels are created by companies and institutions of all kinds. As most of them rely or make a use of a public network, such as the Internet, security of transferred data and information in most cases requires authorization...

2005
Jon Callas

This paper proposes an identity-based encryption (IBE) scheme based on traditional public-key cryptographic systems, such as RSA, DSA, Elgamal, etc. This scheme has a number of advantages over other systems. It can rely upon these traditional systems for its security. Since it uses these traditional encryption schemes, it is interoperable with and easily embedded within an existing security sys...

2006
Hoon Wei Lim

This thesis examines the application of identity-based cryptography (IBC) in designing security infrastructures for grid applications. In this thesis, we propose a fully identity-based key infrastructure for grid (IKIG). Our proposal exploits some interesting properties of hierarchical identity-based cryptography (HIBC) to replicate security services provided by the grid security infrastructure...

Journal: :IACR Cryptology ePrint Archive 2009
Aniket Kate Ian Goldberg

An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages over the Internet. However, an IBE scheme necessarily requires a private-key generator (PKG), which can create private keys for clients, and so can passively eavesdrop on all encrypted communications. Although a distributed PKG has been suggested as a way to mitigate this problem for Boneh ...

2009
Mani Anand

In spite of the vital role played by Digital Certificates in Public Key Cryptographic systems, the overhead involved in maintaining those made them prohibitory. Certificateless Public Key Cryptography [1] was proposed as an alternative. It was based on based on the concept of implicit certification. Even though Certificateless Public Key Cryptography (CLPKC) combines the appealing features of P...

2013
Mohammed Hassouna Nashwa Mohamed Bazara Barry Eihab Bashier

Most of the existing mailing systems provide limited authentication mechanisms, including web trust model, password authentication or identity based cryptography. Few existing mailing systems found in the literature provide strong authentication based on public key infrastructure (PKI). However, PKI based-systems generally suffer from certificate management and scalability problems. This paper ...

Journal: :Inf. Sci. 2014
Lei Zhang Qianhong Wu Josep Domingo-Ferrer Bo Qin Peng Zeng

Recent years, lots of efforts have been devoted to construct secure schemes in certificateless cryptography which eliminates the key escrow problem in identity-based cryptography. However, most of them are designed in traditional certificateless cryptography which suffers from the single-point problem. Hierarchical cryptography exploits a practical security model to mirror the organizational hi...

2009
MOISES SALINAS GALLEGOS GARCIA GONZALO DUCHEN SANCHEZ

This paper describes a solution for nodes and message authentication problems in wireless sensor networks, this solution allows effectively avoiding node-impersonation and messaging falsification among the WSN nodes. The resulting protocol address authentication at two level using identity based cryptography and message authentication codes with SHA-1, for node and message authentication respec...

2007
N. Asokan Kari Kostiainen Philip Ginzboorg Jörg Ott Cheng Luo

Most of the existing Internet applications are built on the assumption of immediate end-to-end connectivity. However, there are many scenarios, like messaging in sparsely populated areas, in which immediate connectivity is not available. Traditional approaches for communication security may not apply in such disruption-prone environments. Recently, the use of identity-based cryptography has bee...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید