Results 11 to 20 of about 12,967 (325)

Privacy Enhancing Protocols using Pairing Based Cryptography [PDF]

open access: gold, 2010
This thesis presents privacy enhanced cryptographic constructions, consisting of formal definitions, algorithms and motivating applications. The contributions are a step towards the development of cryptosystems which, from the design phase, incorporate privacy as a primary goal. Privacy offers a form of protection over personal and other sensitive data
Caroline Sheedy
openalex   +2 more sources

Identity based cryptography from bilinear pairings [PDF]

open access: green, 2005
This report contains an overview of two related areas of research in cryptography which have been prolific in significant advances in recent years. The first of these areas is pairing based cryptography.
Barbosa, Manuel
core   +2 more sources

The review on elliptic curves as cryptographic pairing groups [PDF]

open access: yesMathematics and Computational Sciences, 2021
Elliptic curve is a set of two variable points on polynomials of degree 3 over a field acted by an addition operation that forms a group structure. The motivation of this study is the mathematics behind that elliptic curve to the applicability within a ...
E Khamseh
doaj   +1 more source

Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography

open access: yesIEEE Access, 2022
Blind signature is a special digital signature that allows the signer to sign a document without knowing its content. However, in many situations, multiple people need to blindly sign messages.
Rui Ma, Linyue Du
doaj   +1 more source

A Novel Identity-Based Privacy-Preserving Anonymous Authentication Scheme for Vehicle-to-Vehicle Communication

open access: yesElektronika ir Elektrotechnika, 2023
This paper proposes a novel bilinear pairing-free identity-based privacy-preserving anonymous authentication scheme for vehicle-to-vehicle (V2V) communication, called “NIBPA”.
Yasin Genc   +5 more
doaj   +1 more source

Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures. [PDF]

open access: yesPLoS ONE, 2016
Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical ...
Maocai Wang   +4 more
doaj   +1 more source

Attribute-Based Encryption in Securing Big Data from Post-Quantum Perspective: A Survey

open access: yesCryptography, 2022
Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the scalability issue of recent public key infrastructure (PKI).
Zulianie Binti Jemihin   +2 more
doaj   +1 more source

Efficient and Provably Secure Certificateless Signature Schemes [PDF]

open access: yesJisuanji gongcheng, 2016
Certificateless public key cryptography solves the key escrow problem of identity-based cryptography.In common with identity-based cryptography,certificateless public key cryptography does not rely on certificate.Therefor,this paper references from the ...
TANG Yongli,WANG Feifei,YAN Xixi,LI Zichen
doaj   +1 more source

Rapid calculation of R-ate bilinear pairing in China state cryptography standard SM9 [PDF]

open access: yesJisuanji gongcheng, 2019
R-ate is an important bilinear mapping in the Identity-Based Cryptography(IBC) algorithm of China state cryptography standard SM9.Its computational performance is very important to the application of SM9 cryptosystem.To improve the computational ...
GAN Zhiwang,LIAO Fangyuan
doaj   +1 more source

Home - About - Disclaimer - Privacy