نتایج جستجو برای: identity based cryptography

تعداد نتایج: 3047490  

Journal: :JCP 2013
Ming Luo Donghua Huang Jun Hu

Biometric signcryption, which enables a user using his biometric information as the identity to fulfills both the functions of encryption and digital signature simultaneously, and it provides better overall security and performance. However, almost all biometric signcryption schemes that have been proposed in the literature do not satisfy forward secrecy, known session-specific temporary inform...

Journal: :I. J. Network Security 2016
Suresh Kumar Balakrishnan V. P. Jagathy Raj

Email is currently the most widely used communication system in daily life. To improve security and efficiency, most email systems adopt Public Key Infrastructure (PKI) as the mechanism to implement security, but PKI based systems suffer from expensive certificate management and problems in scalability. Identity Based Cryptography (IBC) is another method, but it has the inherent drawback of Key...

2010
Jan Camenisch Sebastian Mödersheim Dieter Sommer

Identity Mixer is an anonymous credential system developed at IBM that allows users for instance to prove that they are over 18 years old without revealing their name and birthdate. This privacy-friendly technology is realized using zero-knowledge proofs. We describe a formal model of Identity Mixer that is well-suited for automated protocol verification tools in the spirit of black-box cryptog...

2013
P. Ananthi P. Balasubramanie Mohammed A. Alhabeeb Abdullah Almuhaideb Zhenhai Duan Xin Yuan Jaideep Chandrashekar Lee Soon Mohamed Othman Nur Izura Udzir Junaid Israr Mouhcine Guennoun Hussein T. Mouftah

Denial of Service (DoS) attacks present a serious problem for Internet communications. IP source address spoofing is used by DoS and DDoS attacks on targeted victim. IP spoofing to forge the source IP address of the packet, and thereby hide the identity of source. This makes hard to detect and defend against such attack. This paper presents a token based authentication and Packet Marking mechan...

Journal: :CoRR 2017
N. Chaitanya Kumar Abdul Basit Priyadarshi Singh V. Ch. Venkaiah Y. V. Subba Rao

Authenticating a node in mobile ad-hoc networks is a challenging task due to their dynamic and resource constraint infrastructure. For this purpose, MANETS adopt two kinds of approaches Public key cryptography and identity based cryptography. In Public Key Infrastructure (PKI), Certificate Authority (CA) is responsible for key management. In order to adopt it to MANET, the job of the CA must be...

2017
Madhu Babu Rajasekhara Rao

In these days, cyber-crimes are increased drastically it resembles the diminishing of security in sensitive information, to improve the security, cryptography is requires and it plays a vital role. Thus authentication is of at most significance as number of hackers who seek to fraud into authorized users account to obtain sensitive information is increasing; in existing system the identity base...

Cheraghi Cheraghi, Massoud Hadian Dehkordi,

Given a graph G, a visual cryptography scheme based on the graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper we apply maximal independent sets of the grap...

In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind  digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...

2012
Harry Halpin

Currently, the identity eco-system on the Web is fragmented between a number of different flows for authorization with no standardized high-security authentication mechanism outside of usernames-passwords. Current identity solutions such as OpenID Connect and BrowserID are on an abstract level just two different authorization flows that differ across a number of criteria such as privacy. We als...

2009
Shubat S. Ahmeda Ashraf M. Ali Edwila

Short Message Service (SMS) has grown in popularity over the years and it has become a common way of communication, it is a service provided through General System for Mobile Communications (GSM) that allows users to send text messages to others. SMS is usually used to transport unclassified information, but with the rise of mobile commerce it has become a popular tool for transmitting sensitiv...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید