نتایج جستجو برای: identity based cryptography

تعداد نتایج: 3047490  

Journal: :IEEE Access 2021

Vehicular Ad hoc Networks (VANET) broadcast messages regarding road and environmental conditions. Due to its design, VANET inadvertently introduced security privacy issues. Many researchers have suggested various approaches address these shortcomings as the deployment of becomes more widespread. Nevertheless, solutions could not all in VANET. Furthermore, proposed incur high costs terms computa...

Journal: :Wireless Communications and Mobile Computing 2022

A Vehicular Ad Hoc Network (VANET) is a subset of the Mobile (MANET) that allows vehicles to communicate with each other and roadside stations offer efficient safe transportation. Furthermore, when VANET used in connection Internet Things (IoT) devices sensors, it can help traffic management road safety by allowing interact one another at any time from location. Since VANET’s event-driven commu...

2011
Sunder Lal Vandani Verma

Designated verifier signatures are intended to a specific and unique designated verifier, who is the only one person to check their validity. This paper proposes a new efficient non-delegatable strong designated verifier signature scheme based on identity based cryptography. We analyze the security of the scheme and compare its computational aspects with the other ID-SDVS schemes existing in li...

Journal: :IJACT 2008
Xavier Boyen

This paper surveys the practical benefits and drawbacks of several identitybased encryption schemes based on bilinear pairings. After providing some background on identity-based cryptography, we classify the known constructions into a handful of general approaches. We then describe efficient and fully-secure IBE and IBKEM instantiations of each approach, with reducibility to practice as the mai...

Journal: :I. J. Network Security 2010
Ramanarayana Kandikattu Lillykutty Jacob

Wireless Mesh Network (WMN) is advocated as the major supporting technology for the next generation wireless Internet satisfying the needs of anywhere-anytime broadband Internet access. In order to support secure ubiquitous communications for mobile users, WMN must have an efficient key setup procedure to secure control packets as well as data packets. In this paper we apply four different cryp...

Journal: :IACR Cryptology ePrint Archive 2002
Jianhong Zhang Jilin Wang Yumin Wang

Abstract: Group signature is very important primitive in cryptography. A group signature scheme allows any group member to sign on behalf of the group in an anonymous and unlinkable fashion .In case of dispute, group manager can reveal the identity of the signer. Recently, S.Xia and J.You proposed a group signature scheme based on identity with strong separability in which the revocation manage...

2014
Mohammad A AL-Fayoumi Sattar J Aboud

Identity authentication and key agreement schemes play significant role in ad hoc networks. In this paper, a new identity authentication scheme relies on the threshold group signature is introduced. Compared with the current schemes it is secure, efficient and adaptable to a multi-hop feature of ad hoc networks. In addition, a new key agreement scheme based on the threshold cryptography using t...

2011
Jill-Jênn Vie Michel Abdalla

A scheme is said leakage resilient if it remains secure even when an adversary is able to learn partial information about some secret values used throughout the lifetime of the system. This recent area appeared because of the need to develop schemes that resist to sidechannel attacks, such as power-consumption, fault or time analyses. Today, there exist a few encryption schemes that implement t...

2016
Dulal C. Kar Hung L. Ngo Clifton J. Mulkey Geetha Sanapala

It is challenging to secure a wireless sensor network (WSN) because its inexpensive, tiny sensor nodes do not have the necessary processing capability, memory capacity, and battery life to take advantage of the existing security solutions for traditional networks. Existing security solutions for wireless sensor networks are mostly based on symmetric key cryptography with the assumption that sen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید