نتایج جستجو برای: identity based cryptography

تعداد نتایج: 3047490  

Journal: :International Journal of Computer and Communication Engineering 2014

2013
G. Pavithra D. S. John Deva Prasanna

Phishing is an attempt by an individual or a group to get personal confidential information such as passwords, credit card information from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Fake websites which appear very similar to the original ones are being hosted to achieve this. In this paper we have proposed a new approach named as "Countering Phishi...

2015
Sushant Kumar

Biometrics means the automated methods of identifying a person and verify the identity of a person based on physiological or behavioural characteristics. Visual cryptography divide the original image into different shares but any of the share does not give any clue about the original image. As biometric template are stored in the centralized database. Asymmetric digital watermarking is provide ...

Journal: :Trans. Computational Science 2010
Dario Fiore Rosario Gennaro

This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [34]) each party uses its own identity as public key and receives his secret key from a master Key Generation Center, whose public parameters are publicly

2007
Sebastian Pape Nabil Benamar

We propose a public-key signature and encryption application which strongly relies on identity-based public-key cryptography. By alternately using obvious identity information like names and essential image data of the involved parties as public keys we preserve all advantages gained by identity-based public-key schemes, mainly including the absence of a public-key infrastructure [1]. On the ot...

2014
Abhishek Tripathi Kavita Burse

Secret and secure delivery of message is most important issue in field of security hence signcryption were used. The term signcryption is referred as a technique of encrypting the data with the use of signatures in area of public key cryptography. A signcryption technique is a combination of digital signature which is used for authentication and public key cryptography which is used for securin...

Journal: :IACR Cryptology ePrint Archive 2015
Yang Lu Quanling Zhang Jiguo Li

Certificate-based cryptography is a new public-key cryptographic paradigm that has very appealing features, namely it simplifies the certificate management problem in traditional public key cryptography while eliminating the key escrow problem in identity-based cryptography. So far, three authenticated key agreement (AKA) protocols in the setting of certificate-based cryptography have been prop...

2006
Jason Crampton Hoon Wei Lim Kenneth G. Paterson

There have been recent proposals in search of alternative security architectures to PKIs for grid application and e-Science. The application of identity-based cryptography (IBC) in designing a grid security architecture seems to be interesting because of its attractive properties, such as, being certificate-free and having small key sizes. In this paper, we discuss our latest research findings ...

2005
Philipp Grabher Dan Page

Although identity based cryptography offers many functional advantages over conventional public key alternatives, the computational costs are significantly greater. The core computational task is evaluation of a bilinear map, or pairing, over elliptic curves. In this paper we prototype and evaluate polynomial and normal basis field arithmetic on an FPGA device and use it to construct a hardware...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید