Identity-Based Cryptography最新文献

筛选
英文 中文
Certificateless Encryption Certificateless加密
Identity-Based Cryptography Pub Date : 1900-01-01 DOI: 10.3233/978-1-58603-947-9-135
Sherman S. M. Chow
{"title":"Certificateless Encryption","authors":"Sherman S. M. Chow","doi":"10.3233/978-1-58603-947-9-135","DOIUrl":"https://doi.org/10.3233/978-1-58603-947-9-135","url":null,"abstract":"","PeriodicalId":202657,"journal":{"name":"Identity-Based Cryptography","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133584473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Software Implementation of Pairings 配对的软件实现
Identity-Based Cryptography Pub Date : 1900-01-01 DOI: 10.3233/978-1-58603-947-9-188
D. Hankerson, A. Menezes, M. Scott
{"title":"Software Implementation of Pairings","authors":"D. Hankerson, A. Menezes, M. Scott","doi":"10.3233/978-1-58603-947-9-188","DOIUrl":"https://doi.org/10.3233/978-1-58603-947-9-188","url":null,"abstract":"This chapter describes and compares the software implementation of popular elliptic curve pairings on two architectures, of which the Intel Pentium 4 and Core2 are representatives.","PeriodicalId":202657,"journal":{"name":"Identity-Based Cryptography","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131127397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
Generalized IBE in the Exponent-Inversion Framework 指数反演框架下的广义IBE
Identity-Based Cryptography Pub Date : 1900-01-01 DOI: 10.3233/978-1-58603-947-9-83
Xavier Boyen
{"title":"Generalized IBE in the Exponent-Inversion Framework","authors":"Xavier Boyen","doi":"10.3233/978-1-58603-947-9-83","DOIUrl":"https://doi.org/10.3233/978-1-58603-947-9-83","url":null,"abstract":"The purpose of this chapter is to provide an abstraction for the class of Exponent-Inversion IBE exemplified by the [Bscr ][Bscr ]2 and [Sscr ][Kscr ] schemes, and, on the basis of that abstraction, to show that those schemes do support interesting and useful extensions such as HIBE and ABE. \u0000 \u0000Our results narrow, if not entirely close, the “flexibility gap” between the Exponent-Inversion and Commutative-Blinding IBE concepts.","PeriodicalId":202657,"journal":{"name":"Identity-Based Cryptography","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129061875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identity-Based Identification and Signature Schemes using Error Correcting Codes 使用纠错码的基于身份的识别和签名方案
Identity-Based Cryptography Pub Date : 1900-01-01 DOI: 10.3233/978-1-58603-947-9-119
Pierre-Louis Cayrel, P. Gaborit, M. Girault
{"title":"Identity-Based Identification and Signature Schemes using Error Correcting Codes","authors":"Pierre-Louis Cayrel, P. Gaborit, M. Girault","doi":"10.3233/978-1-58603-947-9-119","DOIUrl":"https://doi.org/10.3233/978-1-58603-947-9-119","url":null,"abstract":"Abstract. In this paper, we propose a new identity-based authentica-tion (and signature) scheme based on error-correcting codes. This schemeis up to date the first identity-based scheme not based on number theory.The scheme combines two well known code-based schemes: the signaturescheme of Courtois, Finiasz and Sendrier and the zero-knowledge au-thentication scheme of Stern (which may also be used for signature).The scheme inherits from the characteristics of the previous schemes: ithas a large public key of order 1Mo and necessitates a certain number ofexchange rounds. The scheme can also work in signature but leads to avery large signature of size 1Mo.Keywords : Signature, Authentication, Identity based scheme, Correct-ing codes, Stern, Niederreiter. 1 Introduction Themostcriticalpointofclassicalpublickeycryptography(RSA,ElGamal...)is in the management of the authenticity of the public key. In fact, if Alice man-ages to take Bob’s identity by cheating her own public key as Bob’s one, shewould be able to decipher all messages sent to Bob and to sign any messageusing the stolen identity.In 1984, Shamir introduced the concept of IDentity-based Public Key Cryp-tography ID-PKC [15] in order to simplify the management and the authenti-cation of the public key, which time passing by, had become more and morecomplex.In the ID-PKC scheme of Shamir, the public key of an user is undeniablylinked to his identity on the network (user-id): it can be a concatenation ofany publicly known information: his name, his e-mail, his phone number, etc ...","PeriodicalId":202657,"journal":{"name":"Identity-Based Cryptography","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115207559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信