نتایج جستجو برای: private key cryptosystem

تعداد نتایج: 645641  

Journal: :IACR Cryptology ePrint Archive 2017
Charles Herder Benjamin Fuller Marten van Dijk Srinivas Devadas

Passwords bootstrap symmetric and asymmetric cryptography, tying keys to an individual user. Biometrics are intended to strengthen this tie. Unfortunately, biometrics exhibit noise between repeated readings. Fuzzy extractors (Dodis et al., Eurocrypt 2004) derive stable symmetric keys from noisy sources. We ask if it is also possible for noisy sources to directly replace private keys in asymmetr...

Journal: :International Journal of Computer Applications 2019

Journal: :IEICE Transactions 2006
Noboru Kunihiro Wataru Abe Kazuo Ohta

In 1984, Shamir first introduced the concept of ID-based cryptosystems [1]. Although various schemes have been proposed after his proposal, we may say that the only bilinear map based schemes [2], [3] are practical. In this letter, we examine the realizability of the other scheme: Maurer-Yacobi key distribution scheme [4]. In this scheme, a user’s private key is generated by solving Discrete Lo...

Journal: :Information and Computation 1999

2017
Shafali Agarwal

An increasing demand of secure data transmission over internet leads to the challenge of implementing a consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to initial condition, due to which small change in input produces a major change ...

Journal: :IACR Cryptology ePrint Archive 2013
Yinxia Sun Futai Zhang Limin Shen

Certificateless public key cryptography (CLPKC), with properties of no key escrow and no certificate, has received a lot of attention since its invention. However, membership revocation in certificateless cryptosystem still remains a non-trivial problem: the existing solutions are not practical for use due to either a costly mediator or enormous computation (secret channel). In this paper, we p...

2004
Philippe Golle Markus Jakobsson Ari Juels Paul F. Syverson

We introduce a new cryptographic technique that we call universal re-encryption. A conventional cryptosystem that permits reencryption, such as ElGamal, does so only for a player with knowledge of the public key corresponding to a given ciphertext. In contrast, universal re-encryption can be done without knowledge of public keys. We propose an asymmetric cryptosystem with universal re-encryptio...

Journal: :Computers & Mathematics with Applications 2010

Journal: :Theoretical Computer Science 1999

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید