Results 241 to 250 of about 407,192 (292)
Some of the next articles are maybe not open access.
Electronic Voting Using Identity Based Cryptography
2010 Fourth International Conference on Digital Society, 2010Today voting processes are the most important element of democracy as the society´s way to make decisions. Such processes have been influenced by information technologies until becoming be named electronic voting. This topic has been an active research area, on which, cryptographic primitives are used in order to propose secure protocols.
Roberto Gómez-Cárdenas+2 more
openaire +1 more source
Identity-Based Signcryption from Identity-Based Cryptography
2012A signcryption scheme encrypts and signs data in a single operation which is more efficient than using an encryption scheme combined with a signature scheme. Identity-based cryptography (IBC) does not require users to pre-compute key pairs and obtain certificates for their public keys.
Woomyo Lee, Jae Woo Seo, Pil Joong Lee
openaire +2 more sources
Efficient Pairing-Free Identity-Based Signcryption Scheme for Cloud-Assisted IoT
International Journal of Cloud Applications and Computing, 2022The Internet of Things (IoT) has become a part of our everyday life. Due to limited storage and computational capabilities, data collected by IoT devices outsource to cloud servers.
M. Kiran, S. Pasupuleti, R. Eswari
semanticscholar +1 more source
ZigBee Security Using Identity-Based Cryptography [PDF]
ZigBee is a specification defining a set of protocols and architecture for monitoring and control networks. With the advantages of high availability, low cost and low power consumption, ZigBee is ideal for both residential and industrial settings. This paper proposes an application of identity-based cryptography for security in ZigBee networks.
Son T. Nguyen, Chunming Rong
openaire +1 more source
Identity-Based Cryptography in Public Key Management
2004To guarantee the authenticity of public keys, traditional PKC (Public Key Cryptography) requires certificates signed by a CA (Certification Authority). However, the management of infrastructure supporting certificates is the main complaint against traditional PKC.
Yum, DH, Lee, PJ
openaire +2 more sources
Distributed Private-Key Generators for Identity-Based Cryptography [PDF]
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG), which can create private keys for clients, and so can passively eavesdrop on all encrypted communications.
Ian Goldberg, Aniket Kate
openaire +1 more source
Introduction to Identity-Based Cryptography
2009Identity-based cryptography is a new development of public-key cryptography. It was first proposed by Adi Shamir at CRYPTO'84. However, it took the cryptographic community a long while to produce effective identity-based cryptosystems. Indeed, this solution only appeared at the beginning of the twenty-first century.
openaire +2 more sources
2013
Since computer systems and communication become each time more pervasive, information security takes attention, requiring guarantees for data authentication, integrity and confidentiality. Pervasive communication and computer systems intend to provide access to information and services anytime and anywhere, demanding cryptographic systems more ...
Jenny Torres+2 more
openaire +1 more source
Since computer systems and communication become each time more pervasive, information security takes attention, requiring guarantees for data authentication, integrity and confidentiality. Pervasive communication and computer systems intend to provide access to information and services anytime and anywhere, demanding cryptographic systems more ...
Jenny Torres+2 more
openaire +1 more source
An Interpretation of Identity-Based Cryptography
2007Identity-based cryptography (IBC) is an asymmetric key cryptographic technology with a special feature, in which a user's public key can be an identifier of the user and the corresponding private key is created by binding the identifier with a system master secret. This paper is based on the author's lecture notes in this area.
openaire +2 more sources
Identity-Based Cryptography for Securing Mobile Phone Calls
2009 International Conference on Advanced Information Networking and Applications Workshops, 2009In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to piggyback much of the security overhead for key management to the existing GSM or UMTS infrastructure.
Bernd Freisleben+3 more
openaire +2 more sources