Results 241 to 250 of about 59,119 (273)
Some of the next articles are maybe not open access.

Pseudonym management using mediated identity-based cryptography

Proceedings of the 2005 workshop on Digital identity management, 2005
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third parties in order to access these applications. Widespread acceptance of such services may therefore depend on how privacy sensitive information will be handled in order to ...
Thibault Candebat   +2 more
openaire   +1 more source

Introduction to Identity-Based Cryptography

2009
Identity-based cryptography is a new development of public-key cryptography. It was first proposed by Adi Shamir at CRYPTO'84. However, it took the cryptographic community a long while to produce effective identity-based cryptosystems. Indeed, this solution only appeared at the beginning of the twenty-first century.
openaire   +1 more source

Private Communication Based on Hierarchical Identity-Based Cryptography

2018
Public Key Infrastructure (PKI) is an important tool for securing information in the communication. Presently, a PKI framework demonstrates a pattern toward an emerging worldwide PKI which turns out to be more complicated. In this paper, we address the issue of a contact acquiring a message that it missed, from different contacts of the client while ...
D. Kalyani, R. Sridevi
openaire   +1 more source

Identity-Based Cryptography in Public Key Management

2004
To guarantee the authenticity of public keys, traditional PKC (Public Key Cryptography) requires certificates signed by a CA (Certification Authority). However, the management of infrastructure supporting certificates is the main complaint against traditional PKC.
Yum, DH, Lee, PJ
openaire   +2 more sources

RFID System Security Using Identity-Based Cryptography

2008
RFID was first proposed as a technology for the automatic identification of objects. However, some recent RFID devices can provide additional information and can be used in other applications. Security requirement is essential in most of the applications. An essential research challenge is to provide efficient protection for RFID systems.
Yan Liang, Chunming Rong
openaire   +1 more source

A Secure Identity Authentication Scheme Based on Blockchain and Identity-based Cryptography

2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET), 2019
Most blockchain-based identity authentication systems focus on using blockchain to establish the public key infrastructure (PKI). It can solve the problem of single point of failure and certificate transparency faced by traditional PKI systems, but there are still some problems such as complex certificate management and complex certificate usage ...
Weijun Ao   +4 more
openaire   +1 more source

Simple Identity-Based Cryptography with Mediated RSA

2003
In this paper, we present a general framework for evaluating the performance characteristics of block cipher structures composed of S-boxes and Maximum Distance Separable (MDS) mappings. In particular, we examine nested Substitution-Permutation Networks (SPNs) and Feistel networks with round functions composed of S-boxes and MDS mappings.
Xuhua Ding, Gene Tsudik
openaire   +1 more source

Electronic Payment Scheme Using Identity-Based Cryptography

2007
Online electronic wallet with decentralized credential keepers is an architecture allowing users to leave most of the content of his electronic wallet at the security of his residential electronic keeper, while traveling with his mobile phone. This paper proposed a new security scheme for mobile payment using such architecture.
Son Thanh Nguyen, Chunming Rong
openaire   +1 more source

Cloud Access Secure with Identity Based Cryptography

2015
With the fast evolution of networks and Internet, appeared the concept of the Cloud, the requirements in terms of safety become more and more essential. This requires the introduction of advanced authentication methods, access control and identity management, while respecting the constraints of the services offered by this evolution, such as data ...
Houria Hamadi   +2 more
openaire   +1 more source

Identity-Based Cryptography: Schemes and Implementations

This comprehensive paper presents a thorough analysis of Identity-Based Cryptography (IBC), focusing on both encryption (IBE) and signature (IBS) schemes, along with novel contributions in threshold implementations and zero-knowledge proofs. We provide detailed mathematical formulations and practical implementations of major IBE schemes including Boneh-
openaire   +1 more source

Home - About - Disclaimer - Privacy