Results 271 to 280 of about 59,173 (313)
Some of the next articles are maybe not open access.
Identity-Based Signcryption from Identity-Based Cryptography
2012A signcryption scheme encrypts and signs data in a single operation which is more efficient than using an encryption scheme combined with a signature scheme. Identity-based cryptography (IBC) does not require users to pre-compute key pairs and obtain certificates for their public keys.
Woomyo Lee, Jae Woo Seo, Pil Joong Lee
openaire +1 more source
Leakage-resilient identity-based cryptography from minimal assumptions
Designs, Codes and Cryptography, 2023zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yanwei Zhou +5 more
openaire +2 more sources
Multi-identity management for identity-based cryptography
Journal of Discrete Mathematical Sciences and Cryptography, 2008Abstract In identity-based (or ID-based) cryptography, user identities can be employed as public keys, where each public key maps a unique private key generated by a trusted authority usually called Private Key Generator (PKG). In some situations, a user could hold multiple identities; therefore, he has to manage the same number of private keys.
Mu, Yi, Chen, Zhide, Guo, Fuchun
openaire +1 more source
Improving WTLS Protocol Using Identity-Based Cryptography
2012 International Conference on Management of e-Commerce and e-Government, 2012IBC is emerging as an important contender to traditional public key cryptography for its attractive properties. But the Wireless Transport Layer Security (WTLS) protocol does not support it at present. To resolve this problem, an improved WTLS protocol based on IBC (IB_WTLS) is proposed.
Dai-Rong Yu +3 more
openaire +1 more source
RFID System Security Using Identity-Based Cryptography
2010 Third International Symposium on Intelligent Information Technology and Security Informatics, 2010Two-way authentication is one of the key solutions to improve the security of RFID Tag/Reader due to many attacks on HB, HB+ and HB++. In this paper, we analysis HB, HB+ and HB++ and propose a modified protocol, a two-way authentication to avoid the attacks.
Youqin Chen, Zhide Chen, Li Xu
openaire +1 more source
ZigBee Security Using Identity-Based Cryptography
2007ZigBee is a specification defining a set of protocols and architecture for monitoring and control networks. With the advantages of high availability, low cost and low power consumption, ZigBee is ideal for both residential and industrial settings. This paper proposes an application of identity-based cryptography for security in ZigBee networks.
Son Thanh Nguyen, Chunming Rong
openaire +1 more source
Pseudonym management using mediated identity-based cryptography
Proceedings of the 2005 workshop on Digital identity management, 2005Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third parties in order to access these applications. Widespread acceptance of such services may therefore depend on how privacy sensitive information will be handled in order to ...
Thibault Candebat +2 more
openaire +1 more source
E-passport EAC scheme based on Identity-Based Cryptography
Information Processing Letters, 2010zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, C. H. +3 more
openaire +1 more source
Introduction to Identity-Based Cryptography
2009Identity-based cryptography is a new development of public-key cryptography. It was first proposed by Adi Shamir at CRYPTO'84. However, it took the cryptographic community a long while to produce effective identity-based cryptosystems. Indeed, this solution only appeared at the beginning of the twenty-first century.
openaire +1 more source
Identity-Based Cryptography in Public Key Management
2004To guarantee the authenticity of public keys, traditional PKC (Public Key Cryptography) requires certificates signed by a CA (Certification Authority). However, the management of infrastructure supporting certificates is the main complaint against traditional PKC.
Yum, DH, Lee, PJ
openaire +2 more sources

