Results 241 to 250 of about 59,119 (273)
Some of the next articles are maybe not open access.
Pseudonym management using mediated identity-based cryptography
Proceedings of the 2005 workshop on Digital identity management, 2005Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third parties in order to access these applications. Widespread acceptance of such services may therefore depend on how privacy sensitive information will be handled in order to ...
Thibault Candebat +2 more
openaire +1 more source
Introduction to Identity-Based Cryptography
2009Identity-based cryptography is a new development of public-key cryptography. It was first proposed by Adi Shamir at CRYPTO'84. However, it took the cryptographic community a long while to produce effective identity-based cryptosystems. Indeed, this solution only appeared at the beginning of the twenty-first century.
openaire +1 more source
Private Communication Based on Hierarchical Identity-Based Cryptography
2018Public Key Infrastructure (PKI) is an important tool for securing information in the communication. Presently, a PKI framework demonstrates a pattern toward an emerging worldwide PKI which turns out to be more complicated. In this paper, we address the issue of a contact acquiring a message that it missed, from different contacts of the client while ...
D. Kalyani, R. Sridevi
openaire +1 more source
Identity-Based Cryptography in Public Key Management
2004To guarantee the authenticity of public keys, traditional PKC (Public Key Cryptography) requires certificates signed by a CA (Certification Authority). However, the management of infrastructure supporting certificates is the main complaint against traditional PKC.
Yum, DH, Lee, PJ
openaire +2 more sources
RFID System Security Using Identity-Based Cryptography
2008RFID was first proposed as a technology for the automatic identification of objects. However, some recent RFID devices can provide additional information and can be used in other applications. Security requirement is essential in most of the applications. An essential research challenge is to provide efficient protection for RFID systems.
Yan Liang, Chunming Rong
openaire +1 more source
A Secure Identity Authentication Scheme Based on Blockchain and Identity-based Cryptography
2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET), 2019Most blockchain-based identity authentication systems focus on using blockchain to establish the public key infrastructure (PKI). It can solve the problem of single point of failure and certificate transparency faced by traditional PKI systems, but there are still some problems such as complex certificate management and complex certificate usage ...
Weijun Ao +4 more
openaire +1 more source
Simple Identity-Based Cryptography with Mediated RSA
2003In this paper, we present a general framework for evaluating the performance characteristics of block cipher structures composed of S-boxes and Maximum Distance Separable (MDS) mappings. In particular, we examine nested Substitution-Permutation Networks (SPNs) and Feistel networks with round functions composed of S-boxes and MDS mappings.
Xuhua Ding, Gene Tsudik
openaire +1 more source
Electronic Payment Scheme Using Identity-Based Cryptography
2007Online electronic wallet with decentralized credential keepers is an architecture allowing users to leave most of the content of his electronic wallet at the security of his residential electronic keeper, while traveling with his mobile phone. This paper proposed a new security scheme for mobile payment using such architecture.
Son Thanh Nguyen, Chunming Rong
openaire +1 more source
Cloud Access Secure with Identity Based Cryptography
2015With the fast evolution of networks and Internet, appeared the concept of the Cloud, the requirements in terms of safety become more and more essential. This requires the introduction of advanced authentication methods, access control and identity management, while respecting the constraints of the services offered by this evolution, such as data ...
Houria Hamadi +2 more
openaire +1 more source
Identity-Based Cryptography: Schemes and Implementations
This comprehensive paper presents a thorough analysis of Identity-Based Cryptography (IBC), focusing on both encryption (IBE) and signature (IBS) schemes, along with novel contributions in threshold implementations and zero-knowledge proofs. We provide detailed mathematical formulations and practical implementations of major IBE schemes including Boneh-openaire +1 more source

