نتایج جستجو برای: public key cryptography

تعداد نتایج: 917476  

Journal: :International Journal of Advanced engineering, Management and Science 2017

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2018

2011
Joseph K. Liu Feng Bao Jianying Zhou

In this paper, we propose a short and efficient certificatebased signature (CBS) scheme. Certificate-based cryptography proposed by Gentry [6] combines the merit of traditional public key cryptography (PKI) and identity based cryptography, without use of the costly certificate chain verification process and the removal of key escrow security concern. Under this paradigm, we propose the shortest...

Journal: :CoRR 2015
Haibo Hong Licheng Wang Haseeb Ahmad Jing Li Yixian Yang

As a special type of factorization of finite groups, logarithmic signature (LS) is used as the main component of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2 and MST3. An LS with the shortest length is called a minimal logarithmic signature (MLS) and is even desirable for cryptographic constructions. The MLS conjecture states that ever...

1990
Alfredo De Santis Giuseppe Persiano

In this work WC investigate the power of Public Randomness in the context of Public-key cryptosystcms. We consider the Diffie-Bellman Public-key model in which an additional short random string is shared by all users. This, which we call Public-Key Public-Randomness (PKPR) model, is very powerful as we show that it supports simple non-interactive implementations of important cryptographic primi...

2016
Colin Boyd Xavier Boyen Christopher Carr Thomas Haines

We propose a public key infrastructure framework, inspired by modern distributed cryptocurrencies, that allows for tunable key escrow, where the availability of key escrow is only provided under strict conditions and enforced through cryptographic measures. We argue that any key escrow scheme designed for the global scale must be both inert — requiring considerable effort to recover a key — and...

2016
Aggelos Kiayias Qiang Tang

How is it possible to prevent the sharing of cryptographic functions? This question appears to be fundamentally hard to address since in this setting the owner of the key is the adversary: she wishes to share a program or device that (potentially only partly) implements her main cryptographic functionality. Given that she possesses the cryptographic key, it is impossible for her to be prevented...

2005
Tage Stabell-Kulø Simone Lupetti

When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security guarantees of this technology are based on a particular model of computation. We present the properties of this model that are relevant in the setting of distributed systems. Of particular importance is that the mode...

2015
Reham M. Abobeah Mohamed M. Ezz Hany M. Harb

Cryptography techniques play an important role in modern world. The purpose of such techniques is to ensure the contents being unreadable to anyone except for parties who agreed to use some specific scheme. Moreover, current cryptography techniques provide more sophisticated services, such as message integrity, authentication, time stamping, and many others. There are two main approaches for cr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید