نتایج جستجو برای: identity based cryptography

تعداد نتایج: 3047490  

Journal: :CoRR 2010
P. S. Revenkar Anisa Anjum W. Z. Gandhare

Biometrics deal with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics. Visual cryptography is a secret sharing scheme where a secret image is encrypted into the shares which independently disclose no information about the original secret image. As biometric template are stored in the centralized database, due to...

Journal: :IACR Cryptology ePrint Archive 2011
Rouzbeh Behnia Swee-Huay Heng Syh-Yuan Tan

Certificateless cryptography has attracted much attention due to its distinctive features. By eliminating the certification costs in traditional public key cryptography and addressing the private key escrow problem in identity-based cryptography, certificateless cryptography has become a mesmeric paradigm for developing various cryptographic primitives. Digital signatures with short signature l...

2013
Mohammed Hassouna Nashwa Mohamed Eihab Bashier

Providing the security services (authenticity, integrity, confidentiality and non-repudiation) all together in mobile banking has remained a problematic issue for both banks and their customers. Both the public key infrastructure (PKI) and the identity-based public key cryptography (IB-PKC) which have been thought to provide solutions to these security services, have their own limitations. Whil...

Journal: :Informatica, Lith. Acad. Sci. 2010
Hu Xiong Fagen Li Zhiguang Qin

A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original signer. Recently, in order to eliminate the use of certificates in certified public key cryptography and the key-escrow problem in identity-based cryptography, the notion of certificateless public key cryptography was int...

2007
Lei Zhang Futai Zhang Wei Wu

Ring signature is a kind of group-oriented signature. It allows amember of a group to sign messages on behalf of the group withoutrevealing his/her identity. Certificateless public key cryptography wasfirst introduced by Al-Riyami and Paterson in Asiacrypt 2003. Incertificateless cryptography, it does not require the use of certificatesto guarantee the authenticity of users’...

Journal: :Ad Hoc & Sensor Wireless Networks 2011
Zhong Xu Ruiping Ma Shuai Liu Wenbo He

Wireless ad hoc networks are self-configurable and autonomous networks and this type of networks serve as a good candidate to provide communications of many novel applications, including mission critical applications, mobile and pervasive computing, etc. Such networks are often composed of computation-constrained or resource-limited devices and without any underlying infrastructure. On the othe...

Journal: :Entropy 2016
James Jong Hyuk Park Wanlei Zhou

Entropy is a basic and important concept in information theory. It is also often used as a measure of the unpredictability of a cryptographic key in cryptography research areas. Ubiquitous computing (Ubi-comp) has emerged rapidly as an exciting new paradigm. In this special issue, we mainly selected and discussed papers related with ore theories based on the graph theory to solve computational ...

2012
Divya James Mintu Philip

Protection of biometric data and templates is a crucial issue for the security of biometric systems This paper proposes new security architecture for protection of face templates using visual cryptography and chaotic image encryption. The use of visual cryptography is explored to preserve the privacy of biometric image by decomposing each private face image into two independent public host imag...

2006
Sherman S. M. Chow Colin Boyd Juan Manuel González Nieto

We introduce the notion of security-mediated certificateless (SMC) cryptography. This allows more lightweight versions of mediated cryptography while maintaining the ability for instantaneous revocation of keys. Moreover, our solutions avoid key escrow, which has been used in all previous mediated cryptography algorithms. We provide a model of security against a fully-adaptive chosen ciphertext...

Journal: :I. J. Network Security 2017
Yang Chen Yang Zhao Hu Xiong Feng Yue

The designated verifier signature only enables the designated verifier to check the correctness of the signature, while any third party can not verify whether this signature is valid or not. Most of the previous designated verifier signature schemes depend on certificate-based cryptography or identity-based cryptography, while little attention has been paid to the certificateless designated ver...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید