نتایج جستجو برای: public key cryptography

تعداد نتایج: 917476  

2011
Linjia Yao Syed Taha Ali Vijay Sivaraman Diethelm Ostry

In this paper, we undertake experiments to assess the feasibility of generating common secret keys between two bodyworn devices using the near-body channel. Deriving secret keys using the wireless channel is a practical and lightweight alternative to public-key key-agreement approaches. Our results indicate that key generation is good for dynamic scenarios where communicating devices are placed...

2012
Steven D. Galbraith

Public key cryptography is a major interdisciplinary subject with many real-world applications, such as digital signatures. A strong background in the mathematics underlying public key cryptography is essential for a deep understanding of the subject, and this book provides exactly that for students and researchers in mathematics, computer science and electrical engineering. Carefully written t...

Journal: :Computer and Information Science 2009
Peng Li Yulian Shang Jifeng Wang Yufei Zhang

The generation of the multi-key-pair in the RSA iterative encryption system was studied, and from the generation algorithm of key, a sort of multi-key-pair generation scheme was proposed in the article. In the scheme, the encryption key set and the decryption key set used in the encryption system were managed by the improved half-generation algorithm, and the management scheme that one secrete ...

2000

One of the most promising uses of time-stamping technology lies in combining it with a public key infrastructure. A public-key infrastructure (PKI) consists of protocols, services, and standards supporting applications of public-key cryptography [1]. Public-key cryptography involves the use of a public and private key pair. Data encrypted with a public key can only be decrypted with its related...

2002
Alexandra Boldyreva Markus Jakobsson

The notion of proprietary certificates [7] was recently introduced in an attempt to discourage sharing of access rights to subscription-based resources. A proprietary certificate is a certificate on a public key – the so-called proprietary key – that contains some information related to another (so-called collateral) certificate and has the property that if the owner of the proprietary public k...

Journal: :CoRR 2012
Arkadius G. Kalka

We introduce a generalized Anshel-Anshel-Goldfeld (AAG) key establishment protocol (KEP) for magmas. This leads to the foundation of non-associative public-key cryptography (PKC), generalizing the concept of non-commutative PKC. We show that left selfdistributive systems appear in a natural special case of a generalized AAG-KEP for magmas, and we propose, among others instances, concrete realiz...

Journal: :CoRR 2012
Yongge Wang

Cryptographic standards serve two important goals: making different implementations interoperable and avoiding various known pitfalls in commonly used schemes. This chapter discusses Public-Key Cryptography Standards (PKCS) which have significant impact on the use of public key cryptography in practice. PKCS standards are a set of standards, called PKCS #1 through #15. These standards cover RSA...

2005
Xinyi Huang Willy Susilo Yi Mu Futai Zhang

In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless signature scheme was introduced. In the new paradigm, the necessity of certificates has been successfully removed. The security model for certificateless cryptography was also introduced in the same paper. H...

Journal: :IACR Cryptology ePrint Archive 2010
Falko Strenzke

While it is generally believed that due to their large public key sizes code based public key schemes cannot be conveniently used when memory-constrained devices are involved, we propose an approach for Public Key Infrastructure (PKI) scenarios which totally eliminates the need to store public keys of communication partners. Instead, all the necessary computation steps are performed during the ...

Journal: :Electronic Colloquium on Computational Complexity (ECCC) 2002
Dima Grigoriev

Public-key cryptosystems are suggested based on invariants of groups. We give also an overview of known cryptosystems which involve groups.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید