نتایج جستجو برای: identity based cryptography
تعداد نتایج: 3047490 فیلتر نتایج به سال:
The certificatless cryptography has been studied widely since it could eliminate the need of certificates in the Public Key Infrastructure and solve the inherent key escrow problem in the identity-based cryptography. Recently, Zhang et al.’s proposed the first RSA-based certificateless signature scheme and demonstrated that their scheme is provably secure in the random oracle model. In this pap...
This paper proposes an identity management system model which will ensure secure storage and retrieval of the IDs information in the scalable identity database. The proposed model uses the distributed database technology for information storage and retrieval to make the system more reliable. The IDs information storage is secured by using cryptography mechanism of data conversion in the identit...
The Weil and Tate pairings are a popular new gadget in cryptography and have found many applications, including identity-based cryptography. In particular, the pairings have been used for key exchange protocols. This paper studies the bit security of keys obtained using protocols based on pairings (that is, we show that obtaining certain bits of the common key is as hard as computing the entire...
An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems
Certificateless public key cryptography (CL-PKC) is a new benchmark in modern cryptography. It not only simplifies the certificate management problem of PKC, but also avoids the key escrow problem of the identity based cryptosystem (ID-PKC). In this article, we propose a certificateless blind signature protocol which is based on elliptic curve cryptography (CLB-ECC). The scheme is suitable for ...
Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryptography. Recently, Yum1 and Lee have proposed a generic series construction model of certificateless public key encryption (CL-PKE). However, this model pays much attention on the generic construction and neglects the properties of the pairings. In this paper we propose a CL-P...
Identity-Based Encryption is a public key cryptosystem that uses the receiver identifier information such as email address, IP name and etc, to compute private in encrypt message. A message can obtain secret corresponding with his privacy from Private Key Generator he decrypt ciphertext. In this paper, we review Boneh-Franklin’s scheme use bilinear map Weil pairing’s properties propose an ident...
Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...
Pairing based cryptography has been researched intensively due to its beneficial properties. In 2005, Wu et al. [3] proposed an identity-based key agreement for peer group communication from pairings. In this letter, we propose attacks on their scheme, by which the group fails to agree upon a common communication key. key words: group key agreement, cryptanalysis, pairings, impersonation attack.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید