Electronic Voting Protocol Using Identity-Based Cryptography [PDF]
Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms.
Gina Gallegos-Garcia +1 more
doaj +6 more sources
Integrating Identity-Based Cryptography In Ims Service Authentication [PDF]
13Pages
Abid, Mohamed +3 more
core +9 more sources
ARIBC: Online Reporting Based on Identity-Based Cryptography [PDF]
The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents.
Athanasios Goudosis, Sokratis Katsikas
doaj +4 more sources
Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health. [PDF]
Mittal S +7 more
europepmc +4 more sources
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids. [PDF]
In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system.
Liping Zhang, Shanyu Tang, He Luo
doaj +3 more sources
Identity-Based Cryptography: Schemes and Implementations
This comprehensive paper presents a thorough analysis of Identity-Based Cryptography (IBC), focusing on both encryption (IBE) and signature (IBS) schemes, along with novel contributions in threshold implementations and zero-knowledge proofs. We provide detailed mathematical formulations and practical implementations of major IBE schemes including Boneh-
Pedro F. Albanese
openaire +2 more sources
A Blockchain Network Admission Control Mechanism Using Anonymous Identity-Based Cryptography [PDF]
Permissioned blockchains are increasingly used in areas like supply chain management, financial transactions, and medical data sharing, where ensuring data consistency and security is critical.
Haibao Zhang, Wenbao Jiang, Jin Ding
doaj +2 more sources
Anonymous Data Sharing and Access Control Based on Blockchain and Attribute-Based Cryptography [PDF]
Information security and privacy protection are critical requirements in the era of big data. Identity-based cryptography is a type of public-key cryptography that solves the main management problem of the traditional public key infrastructure.However ...
Jingyi WANG, Baixiang LIU, Ning FANG, Lingqi PENG
doaj +1 more source
Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures. [PDF]
Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical ...
Maocai Wang +4 more
doaj +1 more source
Formal Language Identity-based Cryptography
Summary: The rapid growth of the digital economy makes finegrained access control more and more challenging. One of the most impacted areas is cloud computing, which for security purposes requires cryptographic access control. Currently, the best solution for that is the use of Attribute-based Cryptography, which allows the definition of access ...
Vécsi, Ádám, Pethő, Attila
openaire +2 more sources

