نتایج جستجو برای: identity based cryptography

تعداد نتایج: 3047490  

2013
Yang Lu Jiguo Li

Certificate-based cryptography is a new paradigm that combines traditional public-key cryptography and identity-based cryptography. It not only simplifies the cumbersome certificate management in traditional public-key cryptography, but also eliminates the key escrow and distribution problems inherent in identity-based cryptography. However, all constructions of certificate-based encryption in ...

2003
Marco Casassa Mont Pete Bramhall

Identifier-based Encryption (IBE) is an emerging cryptography schema. As it happens for new technologies, there are ongoing debates about its usefulness and best usage. This paper describes some practical applications of IBE, in the areas of confidentiality enforcement, privacy and identity management. These applications include: a service for timed release of confidential information; a secure...

2005
Joonsang Baek Reihaneh Safavi-Naini Willy Susilo

“Certificateless Public Key Cryptography” has very appealing features, namely it does not require any public key certification (cf. traditional Public Key Cryptography) nor having key escrow problem (cf. Identity-Based Cryptography). Unfortunately, construction of Certificateless Public Key Encryption (CLPKE) schemes has so far depended on the use of Identity-Based Encryption, which results in ...

Journal: :Emerging science journal 2021

A revolutionary change to public-key cryptography can be considered as an Identity Based Cryptography (IBC) in which identity of the receiver is being used a public key for encrypting message and Key Generation Centre (KGC). IBC will generate distribute private each user decrypt message. The thought behind presenting scheme was improve reduce complexity certificate management, but it also gives...

Journal: :IACR Cryptology ePrint Archive 2009
S. Sharmila Deva Selvi S. Sree Vivek C. Pandu Rangan

Certificateless cryptography aims at combining the advantages of identity based and public key cryptography, so as to avoid the key escrow problem inherent in the identity based system and cumbersome certificate management in public key infrastructure. Signcryption achieves confidentiality and authentication simultaneously in an efficient manner. Multi-receiver signcryption demands signcrypting...

Journal: :Inf. Sec. Techn. Report 2003
Chris R. Dalton

Cryptography is an obvious means to secure and protect confidential information. Recently, identity-based public key cryptography schemes not only seem easier to deploy than previous schemes, but also seem equal to the challenges. In this paper, we give a detailed overview of the features and challenges the NHS environment presents to uses of cryptography, to qualify our impressions of our cryp...

2011
Yu-Chi Chen Chao-Liang Liu Gwoboa Horng Kuo-Chang Chen

Proxy signature, a variant of digital signature, is in the limelight in recent years for secure communication. For instance, when a manager is occupied with business matters, or travelling on business, he has to delegate an agent to deal with his day-today office concerns. Therefore, a proxy signature scheme is necessary in this scenario. Although identity-based proxy signature schemes have bee...

2014
Joy Winnie Wise

Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other fraudulent activities. In this paper we have proposed a new approach named as "A Novel Antiphishing framework based on visual cryptography" to solve the problem of phishing. Here an im...

2010
Nadia El Mrabet

Initially, the use of pairings did not involve any secret entry. However in an Identity Based Cryptographic protocol, one of the two entries of the pairing is secret, so fault attack can be applied to Pairing Based Cryptography to nd it. In [18], the author shows that Pairing Based Cryptography in Weierstrass coordinates is vulnerable to a fault attack. The addition law in Edwards coordinates i...

2006
Pietro Michiardi Refik Molva

This paper presents a message authentication scheme built on top of an original construct that combines a simple form of identity based cryptography with an iterated version of RSA. Our scheme blends the features of identity based cryptography and stream authentication while at the same time offering security comparable to that of the basic RSA cryptosystem. As opposed to other authentication s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید