Results 21 to 30 of about 3,647 (300)
Efficient and Provably Secure Certificateless Signature Schemes [PDF]
Certificateless public key cryptography solves the key escrow problem of identity-based cryptography.In common with identity-based cryptography,certificateless public key cryptography does not rely on certificate.Therefor,this paper references from the ...
TANG Yongli,WANG Feifei,YAN Xixi,LI Zichen
doaj +1 more source
It is always an attractive topic for researchers that biometric traits are used to represent the identities of users in identity-based cryptography due to their unique and inherent properties.
Xiwei Shan, Lin You, Gengran Hu
doaj +1 more source
Post-quantum identity-based authenticated multiple key agreement protocol
Authenticated multiple key agreement (AMKA) protocols provide participants with multiple session keys after one round of authentication. Many schemes use Diffie-Hellman or authenticated key agreement schemes that rely on hard integer factorizations that ...
Yang Yang +3 more
doaj +1 more source
Data transmission in intelligent transportation systems is being challenged by a variety of factors, such as open wireless communication channels, that pose problems related to security, anonymity, and privacy.
Santhosh Kumar Sripathi Venkata Naga +3 more
doaj +1 more source
Identity-Based Cryptography for Grid Security [PDF]
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to these members. Identity-based cryptography (IBC) has some attractive properties which seem to align well with the demands of grid computing.
Hoon Wei Lim, Kenneth G. Paterson
openaire +1 more source
A PKC-based security architecture for WSN [PDF]
It is an important challenge to find out suitable cryptography for WSN due to limitations of energy, computation capability and storage resources. Considering this sensor feature on limitations of resources, a security architecture based-on public key ...
Yao Jianbo, Yang Chaoqiong
doaj +1 more source
INTEGRATED CRYPTOGRAPHICAL ACCESS CONTROL OVER NETWORK PROJECT [PDF]
Cryptanalysis is a new ID-based encryption scheme proposed by Meshram. I found a method for factor N, where N is the parameter proposed by Meshram. We also provide a method for retrieving the Secret Master key for Mayshram’s ID-based encryption scheme ...
Yakubu Ajiji Makeri
doaj +1 more source
An Improved Identity-Based Multivariate Signature Scheme Based on Rainbow
Multivariate Public Key Cryptography (MPKC) is one of the main candidates for post-quantum cryptography, especially in the area of signature schemes. In this paper, we instantiate a certificate Identity-Based Signature (IBS) scheme based on Rainbow, one ...
Le Van Luyen
doaj +1 more source
PRESTvO: PRivacy Enabled Smartphone Based Access to Vehicle On-Board Units
Smartphones are quickly moving toward complementing or even replacing traditional car keys. We advocate a role-based access control policy mixed with attributes that facilitates access to various functionalities of vehicular on-board units from ...
Bogdan Groza +4 more
doaj +1 more source
Cross-platform Identity-based Cryptography using WebAssembly [PDF]
The explosive spread of the devices connected to the Internet has increased the need for efficient and portable cryptographic routines. Despite this fact, truly platformindependent implementations are still hard to find. In this paper, an Identitybased Cryptography library, called CryptID is introduced.
Vécsi, Ádám +2 more
openaire +2 more sources

