Results 1 to 10 of about 59,173 (313)

Electronic Voting Protocol Using Identity-Based Cryptography [PDF]

open access: goldThe Scientific World Journal, 2015
Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms.
Gina Gallegos-Garcia   +1 more
doaj   +6 more sources

ARIBC: Online Reporting Based on Identity-Based Cryptography [PDF]

open access: goldFuture Internet, 2021
The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents.
Athanasios Goudosis, Sokratis Katsikas
doaj   +4 more sources

Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids. [PDF]

open access: goldPLoS ONE, 2016
In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system.
Liping Zhang, Shanyu Tang, He Luo
doaj   +3 more sources

Identity-Based Cryptography: Schemes and Implementations

open access: green
This comprehensive paper presents a thorough analysis of Identity-Based Cryptography (IBC), focusing on both encryption (IBE) and signature (IBS) schemes, along with novel contributions in threshold implementations and zero-knowledge proofs. We provide detailed mathematical formulations and practical implementations of major IBE schemes including Boneh-
Pedro F. Albanese
openaire   +2 more sources

A Blockchain Network Admission Control Mechanism Using Anonymous Identity-Based Cryptography [PDF]

open access: goldApplied Sciences
Permissioned blockchains are increasingly used in areas like supply chain management, financial transactions, and medical data sharing, where ensuring data consistency and security is critical.
Haibao Zhang, Wenbao Jiang, Jin Ding
doaj   +2 more sources

Anonymous Data Sharing and Access Control Based on Blockchain and Attribute-Based Cryptography [PDF]

open access: yesJisuanji gongcheng, 2023
Information security and privacy protection are critical requirements in the era of big data. Identity-based cryptography is a type of public-key cryptography that solves the main management problem of the traditional public key infrastructure.However ...
Jingyi WANG, Baixiang LIU, Ning FANG, Lingqi PENG
doaj   +1 more source

Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures. [PDF]

open access: yesPLoS ONE, 2016
Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical ...
Maocai Wang   +4 more
doaj   +1 more source

Formal Language Identity-based Cryptography

open access: yesRad Hrvatske akademije znanosti i umjetnosti Matematičke znanosti, 2021
Summary: The rapid growth of the digital economy makes finegrained access control more and more challenging. One of the most impacted areas is cloud computing, which for security purposes requires cryptographic access control. Currently, the best solution for that is the use of Attribute-based Cryptography, which allows the definition of access ...
Vécsi, Ádám, Pethő, Attila
openaire   +2 more sources

Home - About - Disclaimer - Privacy