Results 261 to 270 of about 3,647 (300)
Some of the next articles are maybe not open access.
Identity Based Cryptography Using Matrices
Wireless Personal Communications, 2021A new method of identity (ID) based Elgamal type encryption/decryption is described. The technique uses rectangular integer matrices in finite field Zp, as the private keys. Adoption of modular arithmetic limits the size of the elements of the key matrices while maintaining reasonably high security levels.
B. S. Sahana Raj, Venugopalachar Sridhar
openaire +1 more source
Indian Journal of Computer Science, 2017
Data security is one of the principle concerns today. Digital signature assumes an important part to guarantee authentication, non-integrity, and non-repudiation on a message. Digital signature can be computed using Rives, Shamir, and Adleman (RSA), and elliptic curve cryptography.
Sarvesh Tanwar, Anil Kumar
openaire +1 more source
Data security is one of the principle concerns today. Digital signature assumes an important part to guarantee authentication, non-integrity, and non-repudiation on a message. Digital signature can be computed using Rives, Shamir, and Adleman (RSA), and elliptic curve cryptography.
Sarvesh Tanwar, Anil Kumar
openaire +1 more source
Identity-Based Cryptography in Credit Card Payments
2014In this paper we describe how to apply identity based cryptography to credit card payments. This would help with reducing the possibility of credit card fraud that is prevalent on the Internet. Our method is founded on the identity-based cryptography and it secures the credit card transactions in such a way that many types of credit card fraud become ...
Sailio Mirko, Halunen Kimmo
openaire +2 more sources
2013
Since computer systems and communication become each time more pervasive, information security takes attention, requiring guarantees for data authentication, integrity and confidentiality. Pervasive communication and computer systems intend to provide access to information and services anytime and anywhere, demanding cryptographic systems more ...
Jenny Torres +2 more
openaire +1 more source
Since computer systems and communication become each time more pervasive, information security takes attention, requiring guarantees for data authentication, integrity and confidentiality. Pervasive communication and computer systems intend to provide access to information and services anytime and anywhere, demanding cryptographic systems more ...
Jenny Torres +2 more
openaire +1 more source
Electronic Voting Using Identity Based Cryptography
2010 Fourth International Conference on Digital Society, 2010Today voting processes are the most important element of democracy as the society´s way to make decisions. Such processes have been influenced by information technologies until becoming be named electronic voting. This topic has been an active research area, on which, cryptographic primitives are used in order to propose secure protocols.
Gina Gallegos-Garcia +2 more
openaire +1 more source
2012
This chapter is devoted to giving a brief introduction to identity-based cryptography (IBC), which presents a nice solution for some problems that limit the wide deployment of public-key cryptography, in particular, the problem of binding public keys with user identities.
openaire +2 more sources
This chapter is devoted to giving a brief introduction to identity-based cryptography (IBC), which presents a nice solution for some problems that limit the wide deployment of public-key cryptography, in particular, the problem of binding public keys with user identities.
openaire +2 more sources
Identity-Based Signcryption from Identity-Based Cryptography
2012A signcryption scheme encrypts and signs data in a single operation which is more efficient than using an encryption scheme combined with a signature scheme. Identity-based cryptography (IBC) does not require users to pre-compute key pairs and obtain certificates for their public keys.
Woomyo Lee, Jae Woo Seo, Pil Joong Lee
openaire +1 more source
Leakage-resilient identity-based cryptography from minimal assumptions
Designs, Codes and Cryptography, 2023zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yanwei Zhou +5 more
openaire +2 more sources
Multi-identity management for identity-based cryptography
Journal of Discrete Mathematical Sciences and Cryptography, 2008Abstract In identity-based (or ID-based) cryptography, user identities can be employed as public keys, where each public key maps a unique private key generated by a trusted authority usually called Private Key Generator (PKG). In some situations, a user could hold multiple identities; therefore, he has to manage the same number of private keys.
Mu, Yi, Chen, Zhide, Guo, Fuchun
openaire +1 more source
Electronic Payment Scheme Using Identity-Based Cryptography
2007Online electronic wallet with decentralized credential keepers is an architecture allowing users to leave most of the content of his electronic wallet at the security of his residential electronic keeper, while traveling with his mobile phone. This paper proposed a new security scheme for mobile payment using such architecture.
Son Thanh Nguyen, Chunming Rong
openaire +1 more source

