نتایج جستجو برای: identity based cryptography

تعداد نتایج: 3047490  

2016

Encryption and key distribution are important primitives to build secure Wireless Sensor Networks (WSN). Different block ciphers were proposed in literature to provide encryption in resource constraint distributed networks. A large amount of different key distribution schemes were implemented, targeting different types of WSNs. These schemes face issues with respect to their requirements, imple...

2014
Thepfusatuo Albert S. Chakravarthi

Instant Messaging (IM) is a type of communications service over the Internet that enables individuals to exchange text messages and track availability of a list of users in real-time. The existing instant messaging technology does not provide built-in support for security feature as proposed idea. And also in Battle Field Management System the most commonly used as means of communication is Wal...

2004
Cariappa Mallanda Shivakumar Basavaraju Archit Kulshrestha Rajgopal Kannan Arjan Durresi S. Sitharama Iyengar

Present research on wireless sensor networks has focused on routing and security independently. In this paper, we present a Secure, Cluster-based, Energy Aware Routing (SCEAR) scheme that provides both a hierarchal energy aware routing and a secure environment for communication. In our approach, the network is divided into clusters with a cluster-head that aggregates the information and securel...

2013
Dominik Schürmann

Encryption and key distribution are important primitives to build secure Wireless Sensor Networks (WSN). Different block ciphers were proposed in literature to provide encryption in resource constraint distributed networks. A large amount of different key distribution schemes were implemented, targeting different types of WSNs. These schemes face issues with respect to their requirements, imple...

2011
Wan An Xiong Yao Huan Gong

MANET(Moving Ad hoc Network) is a convenient infrastructure-less communication network which is commonly susceptible to various attacks. Many key management schemes for MANETs are presented to solve various security problems. Identity (ID)-based cryptography with threshold secret sharing ,ECC and Bilinear Pairing computation is a popular approach for the key management design. In this article, ...

2006
Jung Hee Cheon Nicholas Hopper Yongdae Kim Ivan Osipkov

In this paper we consider two security notions related to Identity Based Encryption: Key-insulated public key encryption, introduced by Dodis, Katz, Xu and Yung; and Timed-Release Public Key cryptography, introduced independently by May and Rivest, Shamir and Wagner. We first formalize the notion of secure timed-release cryptography, and show that, despite several differences in its formulation...

2002
Liqun Chen Keith Harrison David Soldera Nigel P. Smart

We investigate a number of issues related to the use of multiple trust authorities and multiple identities in the type of identifier based cryptography enabled by the Weil and Tate pairings. An example of such a system is the Boneh and Franklin encryption scheme. We present various applications of multiple trust authorities. In particular we focus on how one can equate a trust authority with a ...

2007
John A. Clark John Murdoch John A. McDermid Sevil Sen R. Chivers

A threat model for sensor networks and mobile ad hoc networks (MANETs) is introduced. Components that can be used to form an adversary model are developed. Threat categories, modes of use, and a variety of threats to system assets are identified, including threats to communications, infrastructure services, individual nodes and human users. Example envisaged applications of the threat model are...

Visual cryptography is a method that makes use of the characteristics of human vision and it requires neither the knowledge of cryptography nor the complex calculations. This method was first proposed by Naor and Shamir, its implementation is simple, it has been extended to an secrect sharing (k, n) in which n shares are made from the image and they are distributed among n participants. Moreov...

Journal: :IACR Cryptology ePrint Archive 2017
Kuo-Hui Yeh

In these years, the design of certificateless signature (CLS) scheme without bilinear pairings has been thoroughly investigated owing to its effectiveness on solving the key escrow problem in identity-based cryptography. In this paper, we identify that Wang et al.’s certificateless signature scheme cannot fulfil its security claims. We present a series of attack processes to demonstrate that Wa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید