نتایج جستجو برای: identity based cryptography
تعداد نتایج: 3047490 فیلتر نتایج به سال:
An Identity based cryptography based on visual cryptography scheme was proposed for protecting color image. A color image to be protected and authentic entities such as account number, password, signature image are given as input. The binary key image is obtained by distributing the digital signature of obtained authentic entities. A secret color image which needs to be communicated is decompos...
reserches show that relationship between human and residential places is based upo both emotional and identity structures. in other words, habitat place is not only the creator of a part of humanistic identity but also form a kind of sentimental and emotional bond that may result in tendency to maintain closeness to a specific place. therefor, formaton of emotional and identity relationship wit...
Identity-based public key encryption facilitates easy introduction of public key cryptography by allowing an entity’s public key to be derived from an arbitrary identification value, such as name or email address. The main practical benefit of identity-based cryptography is in greatly reducing the need for, and reliance on, public key certificates. Although some interesting identity-based techn...
Cloud computing is a recently developed with a new technology for complex systems with massivescale services sharing among numerous users. Today most cloud computing system use asymmetric and traditional public key cryptography to provide data security and mutual authentication. Federated Identity Management is a secure single sign-on process between each other and it can enable the portability...
In this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptography (IBC) and their security implications with applications. First, we introduce the basic concepts of security and principles of cryptography and then move into identity-based cryptography, an overview of its development process and research progress. We explain identity-based encryption (IBE)...
Digital Signature authentication is widely used mechanism to transfer sensitive information over networks securely. Digital signature is an electronic signature used for authentication of identity of parties in applications like E-commerce which are frequently involved in monetary transactions. Identity based cryptography can secure digital signature authentication besides ensuring integrity, c...
To achieve secure communication in heterogeneous cryptography systems, we present a heterogeneous hybrid signcryption scheme. The proposed scheme allows a sender in an identity-based cryptography system to send multi-message to multi-receiver in a certificateless cryptography system with different master keys. At the same time, all users are mapped to a distinct pseudo-identity for conditional ...
In software-defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, open channels of SDWSNs make it possible for an attacker eavesdrop, replay, or modify messages, thus posing great threat operations. The security SDWSN has not received enough attention yet. Identity-based cryptography (IBC) may be fitter due its c...
Lossy trapdoor functions, introduced by Peikert and Waters (STOC’08), have received a lot of attention in the last years, because of their wide range of applications in theoretical cryptography. The notion has been recently extended to the identity-based scenario by Bellare et al. (Eurocrypt’12). We provide one more step in this direction, by considering the notion of hierarchical identity-base...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید