Results 271 to 280 of about 59,173 (313)
Some of the next articles are maybe not open access.

Identity-Based Signcryption from Identity-Based Cryptography

2012
A signcryption scheme encrypts and signs data in a single operation which is more efficient than using an encryption scheme combined with a signature scheme. Identity-based cryptography (IBC) does not require users to pre-compute key pairs and obtain certificates for their public keys.
Woomyo Lee, Jae Woo Seo, Pil Joong Lee
openaire   +1 more source

Leakage-resilient identity-based cryptography from minimal assumptions

Designs, Codes and Cryptography, 2023
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yanwei Zhou   +5 more
openaire   +2 more sources

Multi-identity management for identity-based cryptography

Journal of Discrete Mathematical Sciences and Cryptography, 2008
Abstract In identity-based (or ID-based) cryptography, user identities can be employed as public keys, where each public key maps a unique private key generated by a trusted authority usually called Private Key Generator (PKG). In some situations, a user could hold multiple identities; therefore, he has to manage the same number of private keys.
Mu, Yi, Chen, Zhide, Guo, Fuchun
openaire   +1 more source

Improving WTLS Protocol Using Identity-Based Cryptography

2012 International Conference on Management of e-Commerce and e-Government, 2012
IBC is emerging as an important contender to traditional public key cryptography for its attractive properties. But the Wireless Transport Layer Security (WTLS) protocol does not support it at present. To resolve this problem, an improved WTLS protocol based on IBC (IB_WTLS) is proposed.
Dai-Rong Yu   +3 more
openaire   +1 more source

RFID System Security Using Identity-Based Cryptography

2010 Third International Symposium on Intelligent Information Technology and Security Informatics, 2010
Two-way authentication is one of the key solutions to improve the security of RFID Tag/Reader due to many attacks on HB, HB+ and HB++. In this paper, we analysis HB, HB+ and HB++ and propose a modified protocol, a two-way authentication to avoid the attacks.
Youqin Chen, Zhide Chen, Li Xu
openaire   +1 more source

ZigBee Security Using Identity-Based Cryptography

2007
ZigBee is a specification defining a set of protocols and architecture for monitoring and control networks. With the advantages of high availability, low cost and low power consumption, ZigBee is ideal for both residential and industrial settings. This paper proposes an application of identity-based cryptography for security in ZigBee networks.
Son Thanh Nguyen, Chunming Rong
openaire   +1 more source

Pseudonym management using mediated identity-based cryptography

Proceedings of the 2005 workshop on Digital identity management, 2005
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third parties in order to access these applications. Widespread acceptance of such services may therefore depend on how privacy sensitive information will be handled in order to ...
Thibault Candebat   +2 more
openaire   +1 more source

E-passport EAC scheme based on Identity-Based Cryptography

Information Processing Letters, 2010
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, C. H.   +3 more
openaire   +1 more source

Introduction to Identity-Based Cryptography

2009
Identity-based cryptography is a new development of public-key cryptography. It was first proposed by Adi Shamir at CRYPTO'84. However, it took the cryptographic community a long while to produce effective identity-based cryptosystems. Indeed, this solution only appeared at the beginning of the twenty-first century.
openaire   +1 more source

Identity-Based Cryptography in Public Key Management

2004
To guarantee the authenticity of public keys, traditional PKC (Public Key Cryptography) requires certificates signed by a CA (Certification Authority). However, the management of infrastructure supporting certificates is the main complaint against traditional PKC.
Yum, DH, Lee, PJ
openaire   +2 more sources

Home - About - Disclaimer - Privacy