Results 231 to 240 of about 407,192 (292)
Some of the next articles are maybe not open access.
A Secure Identity Authentication Scheme Based on Blockchain and Identity-based Cryptography
2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET), 2019Most blockchain-based identity authentication systems focus on using blockchain to establish the public key infrastructure (PKI). It can solve the problem of single point of failure and certificate transparency faced by traditional PKI systems, but there
Weijun Ao+4 more
semanticscholar +1 more source
Secure V2V Communication with Identity-based Cryptography from License Plate Recognition
International Conference on Internet of Things: Systems, Management and Security, 2019The deployment of secure vehicle-to-vehicle communication is essential for recent technologies such as autonomous driving and traffic optimizations. In this paper we experiment with the use of license plates as a mean to identify vehicles and use this ...
Tudor Andreica, B. Groza
semanticscholar +1 more source
Blockchain-based Distributed Identity Cryptography Key Management
International Conference on Computer Research and Development, 2023The identity-based cryptography algorithm SM9 requires a trusted third-party key generation center KGC to generate the user's private key. This will bring the risks and problems of key escrow and single point failure.
Yanyan Yu+5 more
semanticscholar +1 more source
IEEE Transactions on Dependable and Secure Computing, 2020
Mobile device and application (app) security are increasingly important, partly due to the constant and fast-paced cyberthreat evolution. To ensure the security of communication (e.g., data-in-transit), a number of identity-based signature schemes have ...
De-biao He+3 more
semanticscholar +1 more source
Mobile device and application (app) security are increasingly important, partly due to the constant and fast-paced cyberthreat evolution. To ensure the security of communication (e.g., data-in-transit), a number of identity-based signature schemes have ...
De-biao He+3 more
semanticscholar +1 more source
A secure publish/subscribe protocol for Internet of Things using identity-based cryptography
International Conference on Computer Science and Network Technology, 2016Nowadays, the Internet of Things (IoT) is receiving more attention in commercial and academic research, especially about its security property. However, current protocols cannot satisfy the requirement of various IoT applications and introduce some ...
Wei Peng+4 more
semanticscholar +1 more source
Multi-identity management for identity-based cryptography
Journal of Discrete Mathematical Sciences and Cryptography, 2008Abstract In identity-based (or ID-based) cryptography, user identities can be employed as public keys, where each public key maps a unique private key generated by a trusted authority usually called Private Key Generator (PKG). In some situations, a user could hold multiple identities; therefore, he has to manage the same number of private keys.
Mu, Yi, Chen, Zhide, Guo, Fuchun
openaire +2 more sources
Identity-Based Cryptography in Credit Card Payments
2014In this paper we describe how to apply identity based cryptography to credit card payments. This would help with reducing the possibility of credit card fraud that is prevalent on the Internet. Our method is founded on the identity-based cryptography and it secures the credit card transactions in such a way that many types of credit card fraud become ...
Kimmo Halunen, Mirko Sailio
openaire +2 more sources
IEEE Transactions on Services Computing, 2022
Public verification enables cloud users to employ a third party auditor (TPA) to check the data integrity. However, recent breakthrough results on quantum computers indicate that applying quantum computers in clouds would be realized.
Xiaojun Zhang+4 more
semanticscholar +1 more source
Public verification enables cloud users to employ a third party auditor (TPA) to check the data integrity. However, recent breakthrough results on quantum computers indicate that applying quantum computers in clouds would be realized.
Xiaojun Zhang+4 more
semanticscholar +1 more source
Simple Identity-Based Cryptography with Mediated RSA [PDF]
In this paper, we present a general framework for evaluating the performance characteristics of block cipher structures composed of S-boxes and Maximum Distance Separable (MDS) mappings. In particular, we examine nested Substitution-Permutation Networks (SPNs) and Feistel networks with round functions composed of S-boxes and MDS mappings.
Gene Tsudik, Xuhua Ding
openaire +1 more source
An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage
IEEE Transactions on Information Forensics and Security, 2022Cloud storage is more and more prevalent in practice, and thus how to check its integrity becomes increasingly essential. A classical solution is identity-based (ID-based) provable data possession (PDP), which supports certificateless cloud storage ...
Yang Yang+3 more
semanticscholar +1 more source