نتایج جستجو برای: identity based cryptography

تعداد نتایج: 3047490  

2011
Gopi Krishnan

An Identity based cryptography based on visual cryptography scheme was proposed for protecting color image. A color image to be protected and authentic entities such as account number, password, signature image are given as input. The binary key image is obtained by distributing the digital signature of obtained authentic entities. A secret color image which needs to be communicated is decompos...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه هنر اصفهان - دانشکده معماری و شهرسازی 1389

reserches show that relationship between human and residential places is based upo both emotional and identity structures. in other words, habitat place is not only the creator of a part of humanistic identity but also form a kind of sentimental and emotional bond that may result in tendency to maintain closeness to a specific place. therefor, formaton of emotional and identity relationship wit...

2003
Xuhua Ding Gene Tsudik

Identity-based public key encryption facilitates easy introduction of public key cryptography by allowing an entity’s public key to be derived from an arbitrary identification value, such as name or email address. The main practical benefit of identity-based cryptography is in greatly reducing the need for, and reliance on, public key certificates. Although some interesting identity-based techn...

2016
V. Prasath R. Buvanesvari

Cloud computing is a recently developed with a new technology for complex systems with massivescale services sharing among numerous users. Today most cloud computing system use asymmetric and traditional public key cryptography to provide data security and mutual authentication. Federated Identity Management is a secure single sign-on process between each other and it can enable the portability...

2016
J. H. Cheon Y. Kim H. J. Yoon

In this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptography (IBC) and their security implications with applications. First, we introduce the basic concepts of security and principles of cryptography and then move into identity-based cryptography, an overview of its development process and research progress. We explain identity-based encryption (IBE)...

2014
AUTHENTICATION P. Sumalatha Prof. B. Sathyanarayana

Digital Signature authentication is widely used mechanism to transfer sensitive information over networks securely. Digital signature is an electronic signature used for authentication of identity of parties in applications like E-commerce which are frequently involved in monetary transactions. Identity based cryptography can secure digital signature authentication besides ensuring integrity, c...

Journal: :International Journal of Advanced Research in Artificial Intelligence 2014

2017
Shufen Niu Ling Niu Xiyan Yang Caifen Wang Xiangdong Jia

To achieve secure communication in heterogeneous cryptography systems, we present a heterogeneous hybrid signcryption scheme. The proposed scheme allows a sender in an identity-based cryptography system to send multi-message to multi-receiver in a certificateless cryptography system with different master keys. At the same time, all users are mapped to a distinct pseudo-identity for conditional ...

Journal: :Journal of Sensors 2023

In software-defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, open channels of SDWSNs make it possible for an attacker eavesdrop, replay, or modify messages, thus posing great threat operations. The security SDWSN has not received enough attention yet. Identity-based cryptography (IBC) may be fitter due its c...

Journal: :IACR Cryptology ePrint Archive 2012
Alex Escala Javier Herranz Benoît Libert Carla Ràfols

Lossy trapdoor functions, introduced by Peikert and Waters (STOC’08), have received a lot of attention in the last years, because of their wide range of applications in theoretical cryptography. The notion has been recently extended to the identity-based scenario by Bellare et al. (Eurocrypt’12). We provide one more step in this direction, by considering the notion of hierarchical identity-base...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید