Integrating Identity-Based Cryptography In Ims Service Authentication [PDF]
13Pages
Mohamed Abid +3 more
core +9 more sources
Biometric identity-based cryptography for e-Government environment [PDF]
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main ...
Aljeaid, D, Ma, X, Langensiepen, C
openaire +3 more sources
A Blockchain Network Admission Control Mechanism Using Anonymous Identity-Based Cryptography [PDF]
Permissioned blockchains are increasingly used in areas like supply chain management, financial transactions, and medical data sharing, where ensuring data consistency and security is critical.
Haibao Zhang, Wenbao Jiang, Jin Ding
doaj +2 more sources
Identity-Based Cryptography on Hidden-Order Groups
AbstractRecently, Saxena and Soh presented one novel cryptographic primitive based on associative one-way functions, called oracle-based group with infeasible inversion (O-GII), and it requires the order of group is hidden. In this paper, we propose three ID-based cryptographic schemes, such as ID-based non-interactive key sharing (ID-NIKS) scheme ...
Chanlgu Lin
openalex +2 more sources
Identity based cryptography from bilinear pairings [PDF]
This report contains an overview of two related areas of research in cryptography which have been prolific in significant advances in recent years. The first of these areas is pairing based cryptography. Bilinear pairings over elliptic curves were initially used as formal mathematical tools and later as cryptanalysis tools that rendered supersingular ...
Barbosa, Manuel
openaire +3 more sources
Anonymous Data Sharing and Access Control Based on Blockchain and Attribute-Based Cryptography [PDF]
Information security and privacy protection are critical requirements in the era of big data. Identity-based cryptography is a type of public-key cryptography that solves the main management problem of the traditional public key infrastructure.However ...
Jingyi WANG, Baixiang LIU, Ning FANG, Lingqi PENG
doaj +1 more source
Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures. [PDF]
Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical ...
Maocai Wang +4 more
doaj +1 more source
Formal Language Identity-based Cryptography
Summary: The rapid growth of the digital economy makes finegrained access control more and more challenging. One of the most impacted areas is cloud computing, which for security purposes requires cryptographic access control. Currently, the best solution for that is the use of Attribute-based Cryptography, which allows the definition of access ...
Vécsi, Ádám, Pethő, Attila
openaire +2 more sources
Heterogeneous hybrid signcryption for multi-message and multi-receiver. [PDF]
To achieve secure communication in heterogeneous cryptography systems, we present a heterogeneous hybrid signcryption scheme. The proposed scheme allows a sender in an identity-based cryptography system to send multi-message to multi-receiver in a ...
Shufen Niu +4 more
doaj +1 more source
Efficient and Provably Secure Certificateless Signature Schemes [PDF]
Certificateless public key cryptography solves the key escrow problem of identity-based cryptography.In common with identity-based cryptography,certificateless public key cryptography does not rely on certificate.Therefor,this paper references from the ...
TANG Yongli,WANG Feifei,YAN Xixi,LI Zichen
doaj +1 more source

