Results 281 to 290 of about 58,711 (310)
Some of the next articles are maybe not open access.
Identity-Based Cryptography Techniques and Applications (A Review)
2013 5th International Conference on Computational Intelligence and Communication Networks, 2013This paper is reviewed the state of research on the important topic in the field of information interchange that is identity based cryptography which more or less extention of the public key cryptography field. The paper starts with analyzing the fundamental concepts of identity based cryptography techniques, which includes encryption and the ...
Darpan Anand +2 more
openaire +1 more source
Identity Based Cryptography for secure AODV routing protocol
2012 20th Telecommunications Forum (TELFOR), 2012Mobile Ad hoc Network (MANET) is crowd of mobile node communicates and participate in network operation unused to fixed base station each node depended on the other node to deliver the packet that send from source node to destination. Ad hoc network needed secure routing protocols to protect network from many threat in its environment, In this paper we
Ali M. Sagheer, Hadeel M. Taher
openaire +1 more source
Cloud Access Secure with Identity Based Cryptography
2015With the fast evolution of networks and Internet, appeared the concept of the Cloud, the requirements in terms of safety become more and more essential. This requires the introduction of advanced authentication methods, access control and identity management, while respecting the constraints of the services offered by this evolution, such as data ...
Houria Hamadi +2 more
openaire +1 more source
Identity-Based Cryptography: Schemes and Implementations
This comprehensive paper presents a thorough analysis of Identity-Based Cryptography (IBC), focusing on both encryption (IBE) and signature (IBS) schemes, along with novel contributions in threshold implementations and zero-knowledge proofs. We provide detailed mathematical formulations and practical implementations of major IBE schemes including Boneh-openaire +1 more source
Distributed Private-Key Generators for Identity-Based Cryptography
2010An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG), which can create private keys for clients, and so can passively eavesdrop on all encrypted communications.
Aniket Kate, Ian Goldberg
openaire +1 more source
Identity-Based Cryptography for Grid
Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), 2007Hongwei Li, Shixin Sun
openaire +1 more source
Security in quantum cryptography
Reviews of Modern Physics, 2022Christopher Portmann, Renato Renner
exaly
Identity based cryptography for ad hoc networks
IET Conference Proceedings, 2022M. Usman Rana +3 more
openaire +1 more source
Entanglement-based secure quantum cryptography over 1,120 kilometres
Nature, 2020Juan Yin, Yu-Huai Li, Sheng-Kai Liao
exaly

