نتایج جستجو برای: identity based cryptography

تعداد نتایج: 3047490  

2003
Giuseppe Ateniese Breno de Medeiros

Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon signatures is that their are non-transferable, with only the designated recipient capable of asserting its validity. In this paper, we introduce the first identity-based chameleon hash function. The general advanta...

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

Journal: :Inf. Sci. 2010
Lei Zhang Futai Zhang Qianhong Wu Josep Domingo-Ferrer

Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to prevent active attacks. AKA can be achieved using a public key infrastructure (PKI) or identity-based cryptography. However, the former suffers from a heavy certificate management burden while the latter is subject to the s...

Journal: :Mathematical and Computer Modelling 2011
Debiao He Yitao Chen Jianhua Chen Rui Zhang Weiwei Han

Certificateless public key cryptography (CLPKC), which can simplify the complex certificate management in the traditional public key cryptography and resolve the key escrow problem in identity-based cryptography, has been widely studied. As an important part of CLPKC, certificateless two-party authenticated key agreement (CTAKA) protocols have also received considerable attention. Recently, man...

Journal: :IACR Cryptology ePrint Archive 2013
Bo Yang Zhao Yang Zibi Xiao Shougui Li

Certificateless public key cryptography is an attractive paradigm since it eliminates the use of certificates in traditional public key cryptography and alleviates the inherent key escrow problem in identity-based cryptography. Recently, Xiong et al. proposed a certificateless signature scheme and proved that their scheme is existentially unforgeable against adaptive chosen message attack under...

2013
Lin Cheng Qiaoyan Wen

Certificateless public key cryptography combines advantage of traditional public key cryptography and identity-based public key cryptography as it avoids usage of certificates and resolves the key escrow problem. In 2007, Huang et al. classified adversaries against certificateless signatures according to their attack power into normal, strong and super adversaries (ordered by their attack power...

2013
Jigang Wu Guozhi Song Jing Zhang Gongqing Wu Xuegang Hu Shiying Li Jizeng Wei Thambipillai Srikanthan Honglei Han Wenju Liu Guiyuan Jiang Xin Jin Yujian Li Yihua Zhou Wei Sun Jingmin Wang Meng Li Zhongping Yang Fei Lin Qian Yuan Zhong-ping Yang Jing Bai Jie Wang Xueying Zhang Chenming Sha Junwei Lei

ID-based public key cryptography is proposed to simplify the management of the certification process and greatly reduce the public key authentication computation as well as communication cost. Certified e-mail protocol is a fair exchange of a message for a receipt between two potentially mistrusting parties over the network. A number of certified e-mail protocols have been studied in recent yea...

Journal: :Neural Network World 2014

Journal: :IACR Cryptology ePrint Archive 2009
Chris Peikert

We introduce bonsai trees, a lattice-based cryptographic primitive that we apply to resolve some important open problems in the area. Applications of bonsai trees include: • An efficient, stateless ‘hash-and-sign’ signature scheme in the standard model (i.e., no random oracles), and • The first hierarchical identity-based encryption (HIBE) scheme (also in the standard model) that does not rely ...

Journal: :JSW 2011
Yang Ming Xiaoqin Shen Yamian Peng

A sanitizable signature scheme is a signature which allows a semi-trusted party called sanitizer to hide parts of the original message after the message is signed, without interacting with the signer. A verifier can confirm the integrity of disclosed parts of the sanitized document from the signature. Sanitizable signatures are quite useful in governmental or military offices, where there is a ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید