نتایج جستجو برای: identity based cryptography

تعداد نتایج: 3047490  

Journal: :IACR Cryptology ePrint Archive 2006
Joseph K. Liu Man Ho Au Willy Susilo

Certificateless Public Key Cryptography (CL-PKC) enjoys a number of features of Identity-Based Cryptography (IBC) while without having the problem of key escrow. However, it does suffer to an attack where the adversary, Carol, replaces Alice’s public key by someone’s public key so that Bob, who wants to send an encrypted message to Alice, uses Alice’s identity and other’s public key as the inpu...

Journal: :I. J. Network Security 2015
Ji Geng Hu Xiong Zhiguang Qin Fagen Li

Featured with anonymity and spontaneity, ring signature has been widely adopted in various environments to offer anonymous authentication. To simplify the certificate management in traditional public key infrastructure (PKI) and solve the inherent key escrow problem in the Identity-based cryptography, Qin et al. propose a pairingfree ring signature scheme in the certificate-based cryptosystem r...

2005
Hoon Wei Lim Matthew J. B. Robshaw

This paper introduces the concept of a dynamic key infrastructure for Grid. It utilises the properties of Identity-based Cryptography (IBC) to simplify key management techniques used in current Public Key Infrastructure (PKI) settings for Grid. This approach can offer greater simplicity, flexibility, and enhanced computation trade-offs.

Journal: :IACR Cryptology ePrint Archive 2007
Leonardo B. Oliveira Diego F. Aranha Eduardo Morais Felipe Daguano Julio López Hernandez Ricardo Dahab

In spite of several years of intense research, the area of security and cryptography in Wireless Sensor Networks (WSNs) still has a number of open problems. On the other hand, the advent of Identity-Based Encryption (IBE) has enabled a wide range of new cryptographic solutions. In this work, we argue that IBE is ideal for WSNs and vice versa. We discuss the synergy between the systems, describe...

A. Cheraghi , M. Hadian Dehkordi ,

 Abstract : A visual cryptography scheme based on a given graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper a maximal independent sets of the graph G was ...

2005
Colin Boyd Kim-Kwang Raymond Choo

Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identitybased key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted.

Journal: :IACR Cryptology ePrint Archive 2017
Zhaohui Cheng

SM9 is a Chinese official cryptography standard which defines a set of identity-based cryptographic schemes from pairings. This report describes the technical specification of SM9 as a reference for those practitioners who have difficult to access the Chinese version of the standard.

2012
Chunming Rong Hongbing Cheng

Security and privacy are the main concern for patients to seek wireless body sensor network monitoring their health. Considering the limitations of power, computation capability and storage resources, it is a big challenge to find out suitable secure scheme for patients when relying on wireless body sensor networks to monitor their healthy information. Many schemes based on asymmetric and symme...

Journal: :Wireless Communications and Mobile Computing 2012
David Galindo Rodrigo Roman Javier López

Wireless sensors are battery-powered devices which are highly constrained in terms of computational capabilities, memory, and communication bandwidth. While battery life is their main limitation, they require considerable energy to communicate data. Due to this, it turns out that the energy saving of computationally inexpensive primitives (like symmetric key cryptography) can be nullified by th...

Journal: :Journal of research of the National Institute of Standards and Technology 2015
Dustin Moody Rene Peralta Ray Perlner Andrew Regenscheid Allen Roginsky Lily Chen

This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST's position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in other standard bodies. The report reviews the mathematical background of pairings. This includes topics such as pairing-friendly elliptic cu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید