Results 231 to 240 of about 407,192 (292)
Some of the next articles are maybe not open access.

A Secure Identity Authentication Scheme Based on Blockchain and Identity-based Cryptography

2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET), 2019
Most blockchain-based identity authentication systems focus on using blockchain to establish the public key infrastructure (PKI). It can solve the problem of single point of failure and certificate transparency faced by traditional PKI systems, but there
Weijun Ao   +4 more
semanticscholar   +1 more source

Secure V2V Communication with Identity-based Cryptography from License Plate Recognition

International Conference on Internet of Things: Systems, Management and Security, 2019
The deployment of secure vehicle-to-vehicle communication is essential for recent technologies such as autonomous driving and traffic optimizations. In this paper we experiment with the use of license plates as a mean to identify vehicles and use this ...
Tudor Andreica, B. Groza
semanticscholar   +1 more source

Blockchain-based Distributed Identity Cryptography Key Management

International Conference on Computer Research and Development, 2023
The identity-based cryptography algorithm SM9 requires a trusted third-party key generation center KGC to generate the user's private key. This will bring the risks and problems of key escrow and single point failure.
Yanyan Yu   +5 more
semanticscholar   +1 more source

Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography

IEEE Transactions on Dependable and Secure Computing, 2020
Mobile device and application (app) security are increasingly important, partly due to the constant and fast-paced cyberthreat evolution. To ensure the security of communication (e.g., data-in-transit), a number of identity-based signature schemes have ...
De-biao He   +3 more
semanticscholar   +1 more source

A secure publish/subscribe protocol for Internet of Things using identity-based cryptography

International Conference on Computer Science and Network Technology, 2016
Nowadays, the Internet of Things (IoT) is receiving more attention in commercial and academic research, especially about its security property. However, current protocols cannot satisfy the requirement of various IoT applications and introduce some ...
Wei Peng   +4 more
semanticscholar   +1 more source

Multi-identity management for identity-based cryptography

Journal of Discrete Mathematical Sciences and Cryptography, 2008
Abstract In identity-based (or ID-based) cryptography, user identities can be employed as public keys, where each public key maps a unique private key generated by a trusted authority usually called Private Key Generator (PKG). In some situations, a user could hold multiple identities; therefore, he has to manage the same number of private keys.
Mu, Yi, Chen, Zhide, Guo, Fuchun
openaire   +2 more sources

Identity-Based Cryptography in Credit Card Payments

2014
In this paper we describe how to apply identity based cryptography to credit card payments. This would help with reducing the possibility of credit card fraud that is prevalent on the Internet. Our method is founded on the identity-based cryptography and it secures the credit card transactions in such a way that many types of credit card fraud become ...
Kimmo Halunen, Mirko Sailio
openaire   +2 more sources

DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage

IEEE Transactions on Services Computing, 2022
Public verification enables cloud users to employ a third party auditor (TPA) to check the data integrity. However, recent breakthrough results on quantum computers indicate that applying quantum computers in clouds would be realized.
Xiaojun Zhang   +4 more
semanticscholar   +1 more source

Simple Identity-Based Cryptography with Mediated RSA [PDF]

open access: possible, 2003
In this paper, we present a general framework for evaluating the performance characteristics of block cipher structures composed of S-boxes and Maximum Distance Separable (MDS) mappings. In particular, we examine nested Substitution-Permutation Networks (SPNs) and Feistel networks with round functions composed of S-boxes and MDS mappings.
Gene Tsudik, Xuhua Ding
openaire   +1 more source

An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage

IEEE Transactions on Information Forensics and Security, 2022
Cloud storage is more and more prevalent in practice, and thus how to check its integrity becomes increasingly essential. A classical solution is identity-based (ID-based) provable data possession (PDP), which supports certificateless cloud storage ...
Yang Yang   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy