Results 261 to 270 of about 3,647 (300)
Some of the next articles are maybe not open access.

Identity Based Cryptography Using Matrices

Wireless Personal Communications, 2021
A new method of identity (ID) based Elgamal type encryption/decryption is described. The technique uses rectangular integer matrices in finite field Zp, as the private keys. Adoption of modular arithmetic limits the size of the elements of the key matrices while maintaining reasonably high security levels.
B. S. Sahana Raj, Venugopalachar Sridhar
openaire   +1 more source

Identity Based Cryptography

Indian Journal of Computer Science, 2017
Data security is one of the principle concerns today. Digital signature assumes an important part to guarantee authentication, non-integrity, and non-repudiation on a message. Digital signature can be computed using Rives, Shamir, and Adleman (RSA), and elliptic curve cryptography.
Sarvesh Tanwar, Anil Kumar
openaire   +1 more source

Identity-Based Cryptography in Credit Card Payments

2014
In this paper we describe how to apply identity based cryptography to credit card payments. This would help with reducing the possibility of credit card fraud that is prevalent on the Internet. Our method is founded on the identity-based cryptography and it secures the credit card transactions in such a way that many types of credit card fraud become ...
Sailio Mirko, Halunen Kimmo
openaire   +2 more sources

Identity-Based Cryptography

2013
Since computer systems and communication become each time more pervasive, information security takes attention, requiring guarantees for data authentication, integrity and confidentiality. Pervasive communication and computer systems intend to provide access to information and services anytime and anywhere, demanding cryptographic systems more ...
Jenny Torres   +2 more
openaire   +1 more source

Electronic Voting Using Identity Based Cryptography

2010 Fourth International Conference on Digital Society, 2010
Today voting processes are the most important element of democracy as the society´s way to make decisions. Such processes have been influenced by information technologies until becoming be named electronic voting. This topic has been an active research area, on which, cryptographic primitives are used in order to propose secure protocols.
Gina Gallegos-Garcia   +2 more
openaire   +1 more source

Identity-Based Cryptography

2012
This chapter is devoted to giving a brief introduction to identity-based cryptography (IBC), which presents a nice solution for some problems that limit the wide deployment of public-key cryptography, in particular, the problem of binding public keys with user identities.
openaire   +2 more sources

Identity-Based Signcryption from Identity-Based Cryptography

2012
A signcryption scheme encrypts and signs data in a single operation which is more efficient than using an encryption scheme combined with a signature scheme. Identity-based cryptography (IBC) does not require users to pre-compute key pairs and obtain certificates for their public keys.
Woomyo Lee, Jae Woo Seo, Pil Joong Lee
openaire   +1 more source

Leakage-resilient identity-based cryptography from minimal assumptions

Designs, Codes and Cryptography, 2023
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yanwei Zhou   +5 more
openaire   +2 more sources

Multi-identity management for identity-based cryptography

Journal of Discrete Mathematical Sciences and Cryptography, 2008
Abstract In identity-based (or ID-based) cryptography, user identities can be employed as public keys, where each public key maps a unique private key generated by a trusted authority usually called Private Key Generator (PKG). In some situations, a user could hold multiple identities; therefore, he has to manage the same number of private keys.
Mu, Yi, Chen, Zhide, Guo, Fuchun
openaire   +1 more source

Electronic Payment Scheme Using Identity-Based Cryptography

2007
Online electronic wallet with decentralized credential keepers is an architecture allowing users to leave most of the content of his electronic wallet at the security of his residential electronic keeper, while traveling with his mobile phone. This paper proposed a new security scheme for mobile payment using such architecture.
Son Thanh Nguyen, Chunming Rong
openaire   +1 more source

Home - About - Disclaimer - Privacy