Electronic Voting Protocol Using Identity-Based Cryptography [PDF]
Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms.
Gina Gallegos-Garcia +1 more
doaj +4 more sources
ARIBC: Online Reporting Based on Identity-Based Cryptography [PDF]
The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents.
Athanasios Goudosis, Sokratis Katsikas
doaj +2 more sources
Fare non-repudiation protocol based on identity-based cryptography
A signature scheme with the one-off blind public key was proposed based on identity-based cryptography,and thus was applied in a new fare non-repudiation protocol.In this protocol,the sender was anonymity,so avoid that the recipient deliberately rejected
LIU Hong-wei +3 more
doaj +3 more sources
Anonymous Data Sharing and Access Control Based on Blockchain and Attribute-Based Cryptography [PDF]
Information security and privacy protection are critical requirements in the era of big data. Identity-based cryptography is a type of public-key cryptography that solves the main management problem of the traditional public key infrastructure.However ...
Jingyi WANG, Baixiang LIU, Ning FANG, Lingqi PENG
doaj +1 more source
Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures. [PDF]
Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical ...
Maocai Wang +4 more
doaj +1 more source
Secure AIS with Identity-Based Authentication and Encryption [PDF]
The Automatic Identification System (AIS) offers automatic traffic control and collision avoidance services to the maritime transportation sector worldwide.
Athanasios Goudosis, Sokratis Katsikas
doaj +1 more source
Formal Language Identity-based Cryptography
Summary: The rapid growth of the digital economy makes finegrained access control more and more challenging. One of the most impacted areas is cloud computing, which for security purposes requires cryptographic access control. Currently, the best solution for that is the use of Attribute-based Cryptography, which allows the definition of access ...
Vécsi, Ádám, Pethő, Attila
openaire +2 more sources
Heterogeneous hybrid signcryption for multi-message and multi-receiver. [PDF]
To achieve secure communication in heterogeneous cryptography systems, we present a heterogeneous hybrid signcryption scheme. The proposed scheme allows a sender in an identity-based cryptography system to send multi-message to multi-receiver in a ...
Shufen Niu +4 more
doaj +1 more source
Efficient and Provably Secure Certificateless Signature Schemes [PDF]
Certificateless public key cryptography solves the key escrow problem of identity-based cryptography.In common with identity-based cryptography,certificateless public key cryptography does not rely on certificate.Therefor,this paper references from the ...
TANG Yongli,WANG Feifei,YAN Xixi,LI Zichen
doaj +1 more source
Post-quantum identity-based authenticated multiple key agreement protocol
Authenticated multiple key agreement (AMKA) protocols provide participants with multiple session keys after one round of authentication. Many schemes use Diffie-Hellman or authenticated key agreement schemes that rely on hard integer factorizations that ...
Yang Yang +3 more
doaj +1 more source

